First published: Wed Oct 26 2022(Updated: )
The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leveraging 301 and 302 redirects.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metabase | <0.44.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Metabase vulnerability is CVE-2022-43776.
The title of this Metabase vulnerability is "The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks."
This vulnerability can be exploited by utilizing the url parameter of the /api/geojson endpoint in Metabase versions <44.5 to perform Server Side Request Forgery attacks.
The severity of this vulnerability is medium with a CVSS score of 6.5.
To fix this vulnerability, it is recommended to update Metabase to version 44.5 or higher.