Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-41277 PoC — GeoJSON URL validation can expose server files and environment variables to unauthorized users

Source
Associated Vulnerability
Title:GeoJSON URL validation can expose server files and environment variables to unauthorized users (CVE-2021-41277)
Description:Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
Description
MetaBase 任意文件读取
Readme
# CVE-2021-41277
MetaBase 任意文件读取

个人写的小脚本,写的不好还请指正

声明
:
提供的技术仅供学习参考测试,利用本文提供的信息造成的直接或间接损失由使用者自行承担。
File Snapshot

[4.0K] /data/pocs/f2729c14e5a0e9f7a5eb136b0aa1865c3cb79ea2 ├── [1.2K] CVE-2021-41277.py └── [ 232] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →