Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38646 PoC — Metabase 安全漏洞

Source
Associated Vulnerability
Title:Metabase 安全漏洞 (CVE-2023-38646)
Description:Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
Description
CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点/api/setup/validate时,对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串,利用该端点在服务器上执行任意命令,而无需进行身份验证。
Readme
# Metabase Pre Authentication RCE  (CVE-2023-38646)

CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点`/api/setup/validate`时,对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串,利用该端点在服务器上执行任意命令,而无需进行身份验证。 

具体而言,攻击者首先通过访问`/api/session/properties`获取`setup-token`,然后利用该令牌向`/api/setup/validate`发送包含恶意JDBC连接字符串的请求。由于Metabase对这些请求缺乏充分的安全校验,导致攻击者能够在服务器权限范围内执行任意代码。 

该漏洞的存在主要是由于Metabase在处理数据库连接配置时,未对用户输入的JDBC连接字符串进行严格的安全验证,导致攻击者可以通过精心构造的请求实现远程代码执行。  
File Snapshot

[4.0K] /data/pocs/2bf1bcda3fd6482521155d01ef20f0ce2e1ac6db ├── [3.9K] CVE-2023-38646-POC.py ├── [4.7K] CVE-2023-38646-Reverse-Shell.py ├── [ 11K] LICENSE ├── [ 944] README.md └── [ 8] requirements.txt 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →