CVE-2021-41277:Path Traversal Vulnerability in Metabase Custom GeoJSON Maps Feature

splash
Back

Description Preview

A path traversal vulnerability (CWE-22) was discovered in Metabase's custom GeoJSON map feature. The vulnerability allows attackers to include local files, including environment variables, by exploiting the lack of URL validation in the custom maps functionality. This security issue affects the admin settings for maps where URLs were not properly validated before being loaded, potentially allowing unauthorized access to sensitive information.

Overview

Metabase, an open source data analytics platform, contained a security vulnerability in its custom GeoJSON map feature accessible through the admin settings (admin->settings->maps->custom maps->add a map). The vulnerability stems from improper validation of URLs before they are loaded, which could lead to local file inclusion. This could allow attackers to access sensitive files and environment variables on the server hosting the Metabase instance. The vulnerability is particularly concerning as it could expose configuration details, credentials, and other sensitive information that might be stored in environment variables or local files.

Remediation

To address this vulnerability, users should upgrade to Metabase version 0.40.5, 1.40.5, or any subsequent release that contains the security fix. If immediate upgrading is not possible, a temporary mitigation strategy is to implement validation rules in your reverse proxy, load balancer, or Web Application Firewall (WAF) to filter and validate requests before they reach the Metabase application. Organizations should also review access logs for any suspicious activities that might indicate exploitation attempts of this vulnerability.

References

  1. Patch: https://github.com/metabase/metabase/commit/042a36e49574c749f944e19cf80360fd3dc322f0
  2. Advisory: https://github.com/metabase/metabase/security/advisories/GHSA-w73v-6p7p-fpfr
  3. CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Early Warning

Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.

Armis Alert Date
Nov 17, 2021
CISA KEV Date
Nov 12, 2024
1091days early

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services: Low
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  5. Construction: Low
    Construction
  6. Educational Services: Low
    Educational Services
  7. Finance and Insurance: Low
    Finance and Insurance
  8. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  9. Information: Low
    Information
  10. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  11. Manufacturing: Low
    Manufacturing
  12. Mining: Low
    Mining
  13. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  15. Public Administration: Low
    Public Administration
  16. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  17. Retail Trade: Low
    Retail Trade
  18. Transportation & Warehousing: Low
    Transportation & Warehousing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background