First published: Thu Apr 14 2022(Updated: )
Metabase is an open source business intelligence and analytics application. SQLite has an FDW-like feature called `ATTACH DATABASE`, which allows connecting multiple SQLite databases via the initial connection. If the attacker has SQL permissions to at least one SQLite database, then it can attach this database to a second database, and then it can query across all the tables. To be able to do that the attacker also needs to know the file path to the second database. Users are advised to upgrade as soon as possible. If you're unable to upgrade, you can modify your SQLIte connection strings to contain the url argument `?limit_attached=0`, which will disallow making connections to other SQLite databases. Only users making use of SQLite are affected.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metabase | >=0.41.0<0.41.7 | |
Metabase | >=0.42.0<0.42.4 | |
Metabase | >=1.41.0<1.41.7 | |
Metabase | >=1.42.0<1.42.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24854 is a vulnerability that allows an attacker with SQL permissions to attach arbitrary SQLite databases and potentially execute arbitrary SQL.
CVE-2022-24854 has a severity rating of 8.8, which is considered high.
CVE-2022-24854 affects Metabase versions 0.41.0 to 0.41.7 and 0.42.0 to 0.42.4, as well as versions 1.41.0 to 1.41.7 and 1.42.0 to 1.42.4.
An attacker with SQL permissions to at least one SQLite database can exploit CVE-2022-24854 by using the 'ATTACH DATABASE' feature to connect and execute arbitrary SQL on additional SQLite databases.
Yes, the fix for CVE-2022-24854 is available in the latest versions of Metabase. It is recommended to update to a patched version to mitigate the vulnerability.