Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38646 PoC — Metabase 安全漏洞

Source
Associated Vulnerability
Title:Metabase 安全漏洞 (CVE-2023-38646)
Description:Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
Description
Remote Code Execution on Metabase CVE-2023-38646
Readme
# 🛡️ Exploit for CVE-2023-38646 🛡️

Welcome to this powerful exploit tool! It's designed specifically to test for the CVE-2023-38646 vulnerability in Metabase servers.

## 🚀 Installation 🚀

The journey begins with Python 3 and pip. Install them with the following command:

```bash
sudo apt-get install python3 python3-pip
```

Next, take off with the Python dependencies. Just run the following command:

```bash
pip3 install -r requirements.txt
```

## 🛠️ Usage 🛠️

This tool offers flexibility - test either a single URL or a file containing a list of URLs.

### Testing a single URL 🎯

To scrutinize a single URL, use the `-u` or `--url` option. Feed it the base URL of the server you're aiming at.

Example:

```bash
python3 exploit.py -u https://example.com
```

### Testing a list of URLs 📝

To assess a list of URLs, place all the URLs in a file, one URL per line. Then, use the `-l` or `--list` option and provide the file containing the list of URLs to test.

Example:

```bash
python3 exploit.py -l urls.txt
```

### Additional Options 🎛️

- `-v` or `--verbose`: Unleash detailed output for each step of the process.
- `-t` or `--threads`: Specify the number of threads for the scan. By default, it zips along with 100.
- `-o` or `--output`: Designate the file to save those URLs vulnerable to the exploit.

## ⚠️ Warning ⚠️

This tool is for educational and testing purposes ONLY. Unauthorized attacks on servers are illegal. The creator of this tool disclaims any damage that may occur due to its misuse.

To install dependencies:

```bash
pip install -r requirements.txt
```
Remember to code responsibly and happy testing! 🚀🔒🌐

File Snapshot

[4.0K] /data/pocs/f95deb557f16e4dc1d03891e46019e3e68e467f4 ├── [5.6K] exploit.py ├── [1.7K] README.md └── [ 75] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.