Vulnerability Details : CVE-2021-41277
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
Vulnerability category: Directory traversalFile inclusionInformation leak
Products affected by CVE-2021-41277
- cpe:2.3:a:metabase:metabase:0.40.0:-:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:0.40.1:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:0.40.2:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:0.40.3:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:0.40.4:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:1.40.0:-:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:1.40.1:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:1.40.2:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:1.40.3:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:1.40.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-41277
95.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-41277
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L |
3.9
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2021-41277
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2021-41277
-
https://github.com/metabase/metabase/security/advisories/GHSA-w73v-6p7p-fpfr
GeoJSON URL validation can expose server files and environment variables to unauthorized users · Advisory · metabase/metabase · GitHubThird Party Advisory
-
https://github.com/metabase/metabase/commit/042a36e49574c749f944e19cf80360fd3dc322f0
GeoJSON URL validation fix (#17990) · metabase/metabase@042a36e · GitHubPatch;Third Party Advisory
Jump to