目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2021-41277 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
GeoJSON URL validation can expose server files and environment variables to unauthorized users
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
信息暴露
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Metabase 路径遍历漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 中存在路径遍历漏洞,该漏洞源于产品的 admin->settings->maps->custom maps->add a map 操作缺少权限验证。攻击者可通过该漏洞获得敏感信息。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
metabasemetabase < 0.40.5 -
二、漏洞 CVE-2021-41277 的公开POC
#POC 描述源链接神龙链接
1Metabase任意文件读取漏洞批量扫描工具https://github.com/Seals6/CVE-2021-41277POC详情
2PoC for CVE-2021-41277https://github.com/tahtaciburak/CVE-2021-41277POC详情
3 Metabase 任意文件读取https://github.com/Henry4E36/Metabase-cve-2021-41277POC详情
4MetaBase 任意文件读取漏洞 fofa批量pochttps://github.com/kap1ush0n/CVE-2021-41277POC详情
5simple program for exploit metabasehttps://github.com/z3n70/CVE-2021-41277POC详情
6plugin made for LeakiXhttps://github.com/kaizensecurity/CVE-2021-41277POC详情
7Nonehttps://github.com/Vulnmachines/Metabase_CVE-2021-41277POC详情
8Metabase GeoJSON map local file inclusionhttps://github.com/TheLastVvV/CVE-2021-41277POC详情
9Nonehttps://github.com/zer0yu/CVE-2021-41277POC详情
10CVE-2021-41277 can be extended to an SSRF https://github.com/sasukeourad/CVE-2021-41277_SSRFPOC详情
11It is a nmap script for metabase vulnerability (CVE-2021-41277)https://github.com/frknktlca/Metabase_Nmap_ScriptPOC详情
12MetaBase 任意文件读取https://github.com/Chen-ling-afk/CVE-2021-41277POC详情
13Nonehttps://github.com/RubXkuB/PoC-Metabase-CVE-2021-41277POC详情
14MetaBase 任意文件读取https://github.com/chengling-ing/CVE-2021-41277POC详情
15It is a nmap script for metabase vulnerability (CVE-2021-41277)https://github.com/grey-master-a/Metabase_Nmap_ScriptPOC详情
16Metabase is an open source data analytics platform. In affected versions a local file inclusion security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-41277.yamlPOC详情
17Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metabase%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2021-41277.mdPOC详情
18Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metabase%20geojson%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2021-41277.mdPOC详情
19https://github.com/vulhub/vulhub/blob/master/metabase/CVE-2021-41277/README.mdPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2021-41277 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-41277

暂无评论


发表评论