Vulnerability Details : CVE-2022-39360
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login.
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-39360
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
- cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-39360
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-39360
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-39360
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
-
The product implements an authentication technique, but it skips a step that weakens the technique.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2022-39360
-
https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc
SSO users able to circumvent IdP login by doing password reset · Advisory · metabase/metabase · GitHubThird Party Advisory
-
https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730
Refactor password reset login for SSO users (#25819) (#25826) · metabase/metabase@edadf73 · GitHubPatch;Third Party Advisory
Jump to