First published: Thu Apr 14 2022(Updated: )
Metabase is an open source business intelligence and analytics application. In affected versions Metabase ships with an internal development endpoint `/_internal` that can allow for cross site scripting (XSS) attacks, potentially leading to phishing attempts with malicious links that could lead to account takeover. Users are advised to either upgrade immediately, or block access in your firewall to `/_internal` endpoints for Metabase. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metabase | >=0.40.0<0.40.8 | |
Metabase | >=0.41.0<0.41.7 | |
Metabase | >=0.42.0<0.42.4 | |
Metabase | >=1.40.0<1.40.8 | |
Metabase | >=1.41.0<1.41.7 | |
Metabase | >=1.42.0<1.42.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24855 is a vulnerability in Metabase, an open source business intelligence and analytics application, that allows for cross-site scripting (XSS) attacks through the internal development endpoint.
CVE-2022-24855 has a severity score of 5.4 (high).
CVE-2022-24855 affects versions of Metabase from 0.40.0 to 0.42.4 and versions from 1.40.0 to 1.42.4.
An attacker can exploit CVE-2022-24855 by using cross-site scripting (XSS) techniques to inject and execute malicious code on the affected Metabase instance.
To fix CVE-2022-24855, upgrade your Metabase installation to version 0.42.4 or higher for Metabase 0.x and version 1.42.4 or higher for Metabase 1.x.