The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leveraging 301 and 302 redirects.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46746 | The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leveraging 301 and 302 redirects. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2022-34 |
|
History
Wed, 07 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-05-07T13:33:17.065Z
Reserved: 2022-10-26T00:00:00.000Z
Link: CVE-2022-43776
Updated: 2024-08-03T13:40:06.624Z
Status : Modified
Published: 2022-10-26T18:15:11.087
Modified: 2025-05-07T14:15:38.517
Link: CVE-2022-43776
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD