CVE-2023-37470: Metabase is an open-source business intelligence and analyti..
Aug 4, 2023
Aug 9, 2023
Metabase is an open-source business intelligence and analytics platform. Prior to versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 18.104.22.168, 22.214.171.124, 126.96.36.199, and 188.8.131.52, a vulnerability could potentially allow remote code execution on one's Metabase server. The core issue is that one of the supported data warehouses (an embedded in-memory database H2), exposes a number of ways for a connection string to include code that is then executed by the process running the embedded database. Because Metabase allows users to connect to databases, this means that a user supplied string can be used to inject executable code. Metabase allows users to validate their connection string before adding a database (including on setup), and this validation API was the primary vector used as it can be called without validation. Versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 184.108.40.206, 220.127.116.11, 18.104.22.168, and 22.214.171.124 fix this issue by removing the ability of users to add H2 databases entirely. As a workaround, it is possible to block these vulnerabilities at the network level by blocking the endpoints `POST /api/database`, `PUT /api/database/:id`, and `POST /api/setup/validateuntil`. Those who use H2 as a file-based database should migrate to SQLite.
CVSS base metrics
Learn from academy
What is API?
Types of APIs
GraphQL vs REST
REST vs SOAP
GET vs POST
PUT vs POST
GraphQL Authentication and Authorization
Swagger for API Documentation
Explore more from Akto
Be updated about everything related to API Security, new API vulnerabilities, industry news and product updates.
Discover and find tests from Akto's 100+ API Security test library. Choose your template or add a new template to start your API Security testing.
Check out Akto's product documentation for all information related to features and how to use them.