Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-38646
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Metabase 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2023-38646
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-POC Details
2For educational purposes onlyhttps://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646POC Details
3Metabase Pre-auth RCE (CVE-2023-38646)!!https://github.com/0xrobiul/CVE-2023-38646POC Details
4Remote Code Execution on Metabase CVE-2023-38646https://github.com/Chocapikk/CVE-2023-38646POC Details
5Nonehttps://github.com/Xuxfff/CVE-2023-38646-PocPOC Details
6POC for CVE-2023-38646https://github.com/securezeron/CVE-2023-38646POC Details
7Tools to exploit metabase CVE-2023-38646https://github.com/lazysec0x21/CVE-2023-38646POC Details
8Proof of Concept for CVE-2023-38646https://github.com/Zenmovie/CVE-2023-38646POC Details
9Metabase Pre-auth RCEhttps://github.com/shamo0/CVE-2023-38646-PoCPOC Details
10CVE-2023-38646-POChttps://github.com/fidjiw/CVE-2023-38646-POCPOC Details
11Nonehttps://github.com/Any3ite/cve-2023-38646-metabase-ReverseShellPOC Details
12Automatic Tools For Metabase Exploit Known As CVE-2023-38646https://github.com/robotmikhro/CVE-2023-38646POC Details
13Metabase Pre-auth RCE (CVE-2023-38646)https://github.com/kh4sh3i/CVE-2023-38646POC Details
14CVE-2023-38646 (Pre-Auth RCE in Metabase)https://github.com/joaoviictorti/CVE-2023-38646POC Details
15Nonehttps://github.com/yxl2001/CVE-2023-38646POC Details
16CVE-2023-38646 Pre-Auth RCE in Metabasehttps://github.com/alexandre-pecorilla/CVE-2023-38646POC Details
17Metabase H2 远程代码执行漏洞(CVE-2023-38646)https://github.com/CN016/Metabase-H2-CVE-2023-38646-POC Details
18CVE-2023-38646 Metabase RCEhttps://github.com/Boogipop/MetabaseRceToolsPOC Details
19CVE-2023-38646 Metabase 0.46.6 exploithttps://github.com/SUT0L/CVE-2023-38646POC Details
20CVE-2023-38646 Unauthenticated RCE vulnerability in Metabase https://github.com/nickswink/CVE-2023-38646POC Details
21Nonehttps://github.com/passwa11/CVE-2023-38646POC Details
22Nonehttps://github.com/threatHNTR/CVE-2023-38646POC Details
23Nonehttps://github.com/asepsaepdin/CVE-2023-38646POC Details
24Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)https://github.com/Pyr0sec/CVE-2023-38646POC Details
25Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.https://github.com/birdm4nw/CVE-2023-38646POC Details
26RCE Exploit for CVE-2023-38646https://github.com/AnvithLobo/CVE-2023-38646POC Details
27Python script to exploit CVE-2023-38646 Metabase Pre-Auth RCE via SQL injectionhttps://github.com/Red4mber/CVE-2023-38646POC Details
28Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.https://github.com/junnythemarksman/CVE-2023-38646POC Details
29A crappy exploit script written for CVE-2023-38646. It works about as well as peace treaties between Israel and Hamas.https://github.com/Itrekr/CVE-2023-38646-CrapsploitPOC Details
30Metabase Pre-Auth RCE POChttps://github.com/Mrunalkaran/CVE-2023-38646POC Details
31Code to detect/exploit vulnerable metabase applicationhttps://github.com/j0yb0y0h/CVE-2023-38646POC Details
32Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.https://github.com/Ego1stoo/CVE-2023-38646POC Details
33Metabase postgres (org.h2.Driver) RCE without INIThttps://github.com/0utl4nder/Another-Metabase-RCE-CVE-2023-38646POC Details
34Tools to exploit metabase CVE-2023-38646https://github.com/raytheon0x21/CVE-2023-38646POC Details
35Nonehttps://github.com/Shisones/MetabaseRCE_CVE-2023-38646POC Details
36Nonehttps://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-POC Details
37Exploit for the Remote Code Execution (RCE) vulnerability identified in Metabase versions before 0.46.6.1 (open source) and 1.46.6.1 (Enterprise). Authentication is not required for exploitation.https://github.com/UserConnecting/Exploit-CVE-2023-38646-MetabasePOC Details
38Exploit for CVE-2023-38646, a pre-auth RCE in Metbasehttps://github.com/xchg-rax-rax/CVE-2023-38646POC Details
39This is a script written in Python that allows the exploitation of the Metabase's software security flaw described in CVE-2023-38646.https://github.com/m3m0o/metabase-pre-auth-rce-pocPOC Details
40CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点/api/setup/validate时,对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串,利用该端点在服务器上执行任意命令,而无需进行身份验证。https://github.com/XiaomingX/cve-2023-38646-pocPOC Details
41Proof-of-Concept script for exploiting CVE-2023-38646. Intended for educational and research purposes only.https://github.com/JayRyz/CVE-2023-38646-PoC-MetabasePOC Details
42CVE-2023-38646 Metabase 0.46.6 exploithttps://github.com/DaniTheHack3r/CVE-2023-38646POC Details
43Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-38646.yamlPOC Details
44Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metabase%20%E6%9C%AA%E6%8E%88%E6%9D%83%20JDBC%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-38646.mdPOC Details
45https://github.com/vulhub/vulhub/blob/master/metabase/CVE-2023-38646/README.mdPOC Details
46Nonehttps://github.com/BreezeGalaxy/CVE-2023-38646POC Details
47CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点/api/setup/validate时,对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串,利用该端点在服务器上执行任意命令,而无需进行身份验证。https://github.com/cleanmgr112/cve-2023-38646-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-38646
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-38646

No comments yet


Leave a comment