We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-41277

GeoJSON URL validation can expose server files and environment variables to unauthorized users



Description

Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.

Reserved 2021-09-15 | Published 2021-11-17 | Updated 2024-11-13 | Assigner GitHub_M


CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

CISA Known Exploited Vulnerability

Date added 2024-11-12 | Due date 2024-12-03

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 0.40.5
affected

>= 1.0.0, < 1.40.5
affected

References

github.com/...tabase/security/advisories/GHSA-w73v-6p7p-fpfr

github.com/...ommit/042a36e49574c749f944e19cf80360fd3dc322f0

cve.org (CVE-2021-41277)

nvd.nist.gov (CVE-2021-41277)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-41277

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.