• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
major security flaw discovered in metabase bi software – urgent

Major Security Flaw Discovered in Metabase BI Software – Urgent Update Required

You are here: Home / General Cyber Security News / Major Security Flaw Discovered in Metabase BI Software – Urgent Update Required
July 28, 2023

Buyers of Metabase, a well-liked small business intelligence and details visualization software package deal, are being suggested to update to the most current variation following the discovery of an “exceptionally critical” flaw that could final result in pre-authenticated distant code execution on influenced installations.

Tracked as CVE-2023-38646, the issue impacts open-source editions prior to .46.6.1 and Metabase Business versions prior to 1.46.6.1.

“An unauthenticated attacker can operate arbitrary instructions with the identical privileges as the Metabase server on the server you are running Metabase on,” Metabase stated in an advisory released final week.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The issue has also been tackled in the pursuing older versions –

  • .45.4.1 and 1.45.4.1
  • .44.7.1 and 1.44.7.1, and
  • .43.7.2 and 1.43.7.2

Whilst there is no proof that the issue has been exploited in the wild, details gathered by the Shadowserver Basis reveals that 5,488 out of the complete 6,936 Metabase cases are vulnerable as of July 26, 2023. A vast majority of the occasions are found in the U.S., India, Germany, France, the U.K., Brazil, and Australia.

Approaching WEBINARShield Versus Insider Threats: Grasp SaaS Security Posture Administration

Worried about insider threats? We have obtained you coated! Be part of this webinar to explore practical tactics and the tricks of proactive security with SaaS Security Posture Management.

Be a part of These days

Assetnote, which claimed it learned and noted the bug to Metabase, stated the vulnerability is thanks to a JDBC connection issue in the API endpoint “/api/setup/validate,” enabling a destructive actor to receive a reverse shell on the technique by signifies of a specially crafted request that takes advantage of an SQL injection flaw in the H2 databases driver.

Customers who cannot use the patches promptly are advised to block requests to the /api/setup endpoint, isolate the Metabase occasion from your generation network, and observe for suspicious requests to the endpoint in problem.

Discovered this article interesting? Follow us on Twitter  and LinkedIn to read extra unique material we write-up.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «cybersecurity agencies warn against idor bugs exploited for data breaches Cybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breaches
Next Post: BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities bluebravo deploys graphicalproton backdoor against european diplomatic entities»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.