๐Ÿ” CVE Alert

CVE-2023-38646

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

Vendor n/a
Product n/a
Published Jul 21, 2023
Last Updated Aug 2, 2024
Stay Ahead of the Next One

Get instant alerts for n/a n/a

Be the first to know when new unknown vulnerabilities affecting n/a n/a are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

n/a / n/a
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
metabase.com: https://www.metabase.com/blog/security-advisory github.com: https://github.com/metabase/metabase/releases/tag/v0.46.6.1 news.ycombinator.com: https://news.ycombinator.com/item?id=36812256 github.com: https://github.com/metabase/metabase/issues/32552 packetstormsecurity.com: http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html packetstormsecurity.com: http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html