First published: Wed Oct 26 2022(Updated: )
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metabase | >=0.41.0<0.41.9 | |
Metabase | >=0.42.0<0.42.6 | |
Metabase | >=0.43.0<0.43.7 | |
Metabase | >=0.44.0<0.44.5 | |
Metabase | >=1.41.0<1.41.9 | |
Metabase | >=1.42.0<1.42.6 | |
Metabase | >=1.43.0<1.43.7 | |
Metabase | >=1.44.0<1.44.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39360 is a vulnerability in the Metabase data visualization software that allows SSO users to perform password resets and gain unauthorized access.
The severity of CVE-2022-39360 is medium with a score of 6.5.
CVE-2022-39360 can be exploited by SSO users performing password resets to bypass SSO authentication.
Versions 0.41.0 to 0.41.9, 0.42.0 to 0.42.6, 0.43.0 to 0.43.7, 0.44.0 to 0.44.5, 1.41.0 to 1.41.9, 1.42.0 to 1.42.6, 1.43.0 to 1.43.7, and 1.44.0 to 1.44.5 of Metabase are affected by CVE-2022-39360.
To fix CVE-2022-39360, upgrade Metabase to version 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, or 1.41.9.