Vulnerability Details : CVE-2022-39359
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, custom GeoJSON map URL address would follow redirects to addresses that were otherwise disallowed, like link-local or private-network. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer follow redirects on GeoJSON map URLs. An environment variable `MB_CUSTOM_GEOJSON_ENABLED` was also added to disable custom GeoJSON completely (`true` by default).
Vulnerability category: Open redirectInformation leak
Products affected by CVE-2022-39359
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-39359
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-39359
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-39359
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
-
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-39359
-
https://github.com/metabase/metabase/commit/057e2d67fcbeb6b48db68b697e022243e3a5771e
Refactor GeoJSON URL fetching logic (#25816) (#25821) · metabase/metabase@057e2d6 · GitHubPatch;Third Party Advisory
-
https://github.com/metabase/metabase/security/advisories/GHSA-w5j7-4mgm-77f4
GeoJSON validation doesn't prevent redirects to blocked URLs · Advisory · metabase/metabase · GitHubThird Party Advisory
Jump to