Skip to main content

CVE-2022-24854: CWE-610: Externally Controlled Reference to a Resource in Another Sphere in metabase metabase

Medium
Published: Thu Apr 14 2022 (04/14/2022, 21:40:11 UTC)
Source: CVE
Vendor/Project: metabase
Product: metabase

Description

Metabase is an open source business intelligence and analytics application. SQLite has an FDW-like feature called `ATTACH DATABASE`, which allows connecting multiple SQLite databases via the initial connection. If the attacker has SQL permissions to at least one SQLite database, then it can attach this database to a second database, and then it can query across all the tables. To be able to do that the attacker also needs to know the file path to the second database. Users are advised to upgrade as soon as possible. If you're unable to upgrade, you can modify your SQLIte connection strings to contain the url argument `?limit_attached=0`, which will disallow making connections to other SQLite databases. Only users making use of SQLite are affected.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:50:13 UTC

Technical Analysis

CVE-2022-24854 is a medium-severity vulnerability affecting Metabase, an open-source business intelligence and analytics platform. The vulnerability arises from the way Metabase uses SQLite databases, specifically leveraging SQLite's ATTACH DATABASE feature. This feature allows multiple SQLite databases to be connected via a single connection, enabling cross-database queries. The vulnerability occurs when an attacker who already has SQL permissions on one SQLite database can attach a second database by specifying its file path, thereby gaining the ability to query across all tables in both databases. This is an example of CWE-610: Externally Controlled Reference to a Resource in Another Sphere, where an external input controls access to resources outside the intended scope. Exploitation requires the attacker to have SQL permissions on at least one database and knowledge of the file path to the second database. The attack vector is limited to environments where Metabase uses SQLite as its backend database. The vulnerability affects Metabase versions from 0.41.0 up to but not including 0.41.7, 1.41.0 up to but not including 1.41.7, and 0.42.0 up to but not including 0.42.4, and 1.42.0 up to but not including 1.42.4. No known exploits have been reported in the wild. Mitigation includes upgrading to patched versions or, if upgrading is not immediately possible, modifying SQLite connection strings to include the URL argument '?limit_attached=0' to disable the ATTACH DATABASE functionality, thereby preventing cross-database attachments.

Potential Impact

For European organizations using Metabase with SQLite as the backend, this vulnerability could lead to unauthorized data exposure across multiple databases within the same environment. An attacker with SQL permissions on one database could escalate their access to other databases by attaching them, potentially accessing sensitive or confidential business intelligence data that was not intended to be accessible. This could compromise data confidentiality and integrity, especially in multi-tenant or segmented database environments. The impact is somewhat limited by the prerequisite that the attacker must already have SQL permissions and knowledge of the file path to the second database, which reduces the likelihood of remote exploitation without insider access or prior compromise. However, in environments where Metabase is used to analyze sensitive data such as financial records, personal data, or strategic business information, the vulnerability could facilitate lateral movement and data exfiltration. Availability is less likely to be directly impacted by this vulnerability. Given the widespread use of Metabase in analytics and reporting, unauthorized data access could lead to regulatory compliance issues under GDPR and damage to organizational reputation.

Mitigation Recommendations

1. Upgrade Metabase to the latest patched versions beyond 1.41.7 and 1.42.4 or their respective minor versions as soon as possible to eliminate the vulnerability. 2. For organizations unable to upgrade immediately, modify the SQLite connection string used by Metabase to include the URL argument '?limit_attached=0'. This disables the ATTACH DATABASE feature, preventing cross-database attachments and mitigating the vulnerability. 3. Restrict SQL permissions rigorously within Metabase to minimize the number of users or processes that have write or attach capabilities on SQLite databases. 4. Implement strict file system permissions to limit access to SQLite database files, ensuring that unauthorized users cannot discover or access database file paths. 5. Monitor database query logs for unusual cross-database queries or attempts to attach databases, which could indicate exploitation attempts. 6. Conduct regular audits of Metabase configurations and database access controls to ensure adherence to the principle of least privilege. 7. Consider migrating from SQLite to more robust database backends if multi-database access control is critical and cannot be sufficiently secured in SQLite environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2ca0

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 10:50:13 AM

Last updated: 8/13/2025, 7:05:19 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats