# GeoJSON URL验证可能将服务器文件和环境变量暴露给未经授权的用户
## 漏洞概述
Metabase 是一个开源的数据分析平台。在受影响版本中,发现了一个与自定义 GeoJSON 地图相关的安全问题,可能导致本地文件包含(包括环境变量)。由于 URL 在加载前未经过验证,攻击者可能利用此漏洞。
## 影响版本
- 0.40.x 版本(直到 0.40.4)
- 1.40.x 版本(直到 1.40.4)
## 细节
在“admin->settings->maps->custom maps->add a map”中,自定义 GeoJSON 地图的支持存在安全漏洞,未对 URL 进行验证便被加载,可能导致本地文件包含(包括环境变量)泄露。
## 影响
本漏洞可能允许攻击者通过加载未经验证的 URL 来进行本地文件包含攻击,泄露环境变量等敏感信息。官方已在维护版本 0.40.5 和 1.40.5 中修复了该漏洞。若无法立即升级,可以通过在反向代理、负载均衡器或 WAF 中添加验证过滤规则来缓解此问题。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Metabase任意文件读取漏洞批量扫描工具 | https://github.com/Seals6/CVE-2021-41277 | POC详情 |
2 | PoC for CVE-2021-41277 | https://github.com/tahtaciburak/CVE-2021-41277 | POC详情 |
3 | Metabase 任意文件读取 | https://github.com/Henry4E36/Metabase-cve-2021-41277 | POC详情 |
4 | MetaBase 任意文件读取漏洞 fofa批量poc | https://github.com/kap1ush0n/CVE-2021-41277 | POC详情 |
5 | simple program for exploit metabase | https://github.com/z3n70/CVE-2021-41277 | POC详情 |
6 | plugin made for LeakiX | https://github.com/kaizensecurity/CVE-2021-41277 | POC详情 |
7 | None | https://github.com/Vulnmachines/Metabase_CVE-2021-41277 | POC详情 |
8 | Metabase GeoJSON map local file inclusion | https://github.com/TheLastVvV/CVE-2021-41277 | POC详情 |
9 | None | https://github.com/zer0yu/CVE-2021-41277 | POC详情 |
10 | CVE-2021-41277 can be extended to an SSRF | https://github.com/sasukeourad/CVE-2021-41277_SSRF | POC详情 |
11 | It is a nmap script for metabase vulnerability (CVE-2021-41277) | https://github.com/frknktlca/Metabase_Nmap_Script | POC详情 |
12 | MetaBase 任意文件读取 | https://github.com/Chen-ling-afk/CVE-2021-41277 | POC详情 |
13 | None | https://github.com/RubXkuB/PoC-Metabase-CVE-2021-41277 | POC详情 |
14 | MetaBase 任意文件读取 | https://github.com/chengling-ing/CVE-2021-41277 | POC详情 |
15 | It is a nmap script for metabase vulnerability (CVE-2021-41277) | https://github.com/grey-master-a/Metabase_Nmap_Script | POC详情 |
16 | Metabase is an open source data analytics platform. In affected versions a local file inclusion security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-41277.yaml | POC详情 |
17 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metabase%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2021-41277.md | POC详情 |
18 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metabase%20geojson%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2021-41277.md | POC详情 |
19 | https://github.com/vulhub/vulhub/blob/master/metabase/CVE-2021-41277/README.md | POC详情 |
暂无评论