Vulnerability Description
The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leveraging 301 and 302 redirects.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Metabase | Metabase | < 0.44.5 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2022-34ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2022-34ExploitThird Party Advisory
FAQ
What is CVE-2022-43776?
CVE-2022-43776 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leverag...
How severe is CVE-2022-43776?
CVE-2022-43776 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43776?
Check the references section above for vendor advisories and patch information. Affected products include: Metabase Metabase.