2025-01-08 09:32:44 +09:00
[
{
"id" : 672501684 ,
"name" : "CVE-2023-38646" ,
"full_name" : "securezeron\/CVE-2023-38646" ,
"owner" : {
"login" : "securezeron" ,
"id" : 94959126 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/94959126?v=4" ,
"html_url" : "https:\/\/github.com\/securezeron" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/securezeron\/CVE-2023-38646" ,
"description" : "POC for CVE-2023-38646" ,
"fork" : false ,
"created_at" : "2023-07-30T09:56:52Z" ,
"updated_at" : "2024-06-01T00:11:52Z" ,
"pushed_at" : "2023-12-07T11:10:46Z" ,
"stargazers_count" : 20 ,
"watchers_count" : 20 ,
"has_discussions" : false ,
"forks_count" : 13 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 13 ,
"watchers" : 20 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 672876505 ,
"name" : "CVE-2023-38646" ,
"full_name" : "Zenmovie\/CVE-2023-38646" ,
"owner" : {
"login" : "Zenmovie" ,
"id" : 98185655 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4" ,
"html_url" : "https:\/\/github.com\/Zenmovie" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Zenmovie\/CVE-2023-38646" ,
"description" : "Proof of Concept for CVE-2023-38646" ,
"fork" : false ,
"created_at" : "2023-07-31T11:18:21Z" ,
"updated_at" : "2024-05-16T06:46:08Z" ,
"pushed_at" : "2023-10-08T02:29:00Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 701997863 ,
"name" : "CVE-2023-38646" ,
"full_name" : "yxl2001\/CVE-2023-38646" ,
"owner" : {
"login" : "yxl2001" ,
"id" : 56950033 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56950033?v=4" ,
"html_url" : "https:\/\/github.com\/yxl2001" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yxl2001\/CVE-2023-38646" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-10-08T07:36:57Z" ,
"updated_at" : "2023-10-08T07:47:59Z" ,
"pushed_at" : "2023-10-08T07:51:08Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 702119098 ,
"name" : "CVE-2023-38646" ,
"full_name" : "alexandre-pecorilla\/CVE-2023-38646" ,
"owner" : {
"login" : "alexandre-pecorilla" ,
"id" : 76220633 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76220633?v=4" ,
"html_url" : "https:\/\/github.com\/alexandre-pecorilla" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alexandre-pecorilla\/CVE-2023-38646" ,
"description" : "CVE-2023-38646 Pre-Auth RCE in Metabase" ,
"fork" : false ,
"created_at" : "2023-10-08T14:52:35Z" ,
"updated_at" : "2023-10-10T18:09:37Z" ,
"pushed_at" : "2023-10-08T15:25:52Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 702259752 ,
"name" : "metabase-pre-auth-rce-poc" ,
"full_name" : "m3m0o\/metabase-pre-auth-rce-poc" ,
"owner" : {
"login" : "m3m0o" ,
"id" : 130102748 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/130102748?v=4" ,
"html_url" : "https:\/\/github.com\/m3m0o" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/m3m0o\/metabase-pre-auth-rce-poc" ,
"description" : "This is a script written in Python that allows the exploitation of the Metabase's software security flaw described in CVE-2023-38646." ,
"fork" : false ,
"created_at" : "2023-10-09T00:26:38Z" ,
"updated_at" : "2024-11-17T18:13:36Z" ,
"pushed_at" : "2024-07-07T17:44:16Z" ,
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-38646" ,
"exploit" ,
"metabase" ,
"poc" ,
"rce-exploit"
] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 26 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 702912772 ,
"name" : "Metabase-H2-CVE-2023-38646-" ,
"full_name" : "CN016\/Metabase-H2-CVE-2023-38646-" ,
"owner" : {
"login" : "CN016" ,
"id" : 108575004 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4" ,
"html_url" : "https:\/\/github.com\/CN016" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/CN016\/Metabase-H2-CVE-2023-38646-" ,
"description" : "Metabase H2 远程代码执行漏洞(CVE-2023-38646)" ,
"fork" : false ,
"created_at" : "2023-10-10T08:45:14Z" ,
"updated_at" : "2023-10-10T08:45:57Z" ,
"pushed_at" : "2023-10-10T08:45:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 703324516 ,
"name" : "MetabaseRceTools" ,
"full_name" : "Boogipop\/MetabaseRceTools" ,
"owner" : {
"login" : "Boogipop" ,
"id" : 114604850 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114604850?v=4" ,
"html_url" : "https:\/\/github.com\/Boogipop" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Boogipop\/MetabaseRceTools" ,
"description" : "CVE-2023-38646 Metabase RCE" ,
"fork" : false ,
"created_at" : "2023-10-11T03:18:09Z" ,
"updated_at" : "2024-12-26T05:01:51Z" ,
"pushed_at" : "2023-10-11T04:06:43Z" ,
"stargazers_count" : 51 ,
"watchers_count" : 51 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-38646" ,
"gui" ,
"metabase" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 51 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 703739148 ,
"name" : "CVE-2023-38646" ,
"full_name" : "nickswink\/CVE-2023-38646" ,
"owner" : {
"login" : "nickswink" ,
"id" : 57839593 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57839593?v=4" ,
"html_url" : "https:\/\/github.com\/nickswink" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/nickswink\/CVE-2023-38646" ,
"description" : "CVE-2023-38646 Unauthenticated RCE vulnerability in Metabase " ,
"fork" : false ,
"created_at" : "2023-10-11T20:17:14Z" ,
"updated_at" : "2023-11-03T07:26:19Z" ,
"pushed_at" : "2023-10-12T14:41:02Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 703830211 ,
"name" : "CVE-2023-38646" ,
"full_name" : "passwa11\/CVE-2023-38646" ,
"owner" : {
"login" : "passwa11" ,
"id" : 112363374 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4" ,
"html_url" : "https:\/\/github.com\/passwa11" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/passwa11\/CVE-2023-38646" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-10-12T02:24:12Z" ,
"updated_at" : "2023-10-12T02:24:24Z" ,
"pushed_at" : "2023-10-12T02:24:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 704099223 ,
"name" : "CVE-2023-38646" ,
"full_name" : "threatHNTR\/CVE-2023-38646" ,
"owner" : {
"login" : "threatHNTR" ,
"id" : 102164992 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/102164992?v=4" ,
"html_url" : "https:\/\/github.com\/threatHNTR" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/threatHNTR\/CVE-2023-38646" ,
"description" : "This is a Proof of Concept (PoC) script for exploiting Metabase, an open-source business intelligence and data analytics tool." ,
"fork" : false ,
"created_at" : "2023-10-12T14:32:17Z" ,
"updated_at" : "2023-12-04T16:03:16Z" ,
"pushed_at" : "2023-10-17T22:12:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 704953176 ,
"name" : "CVE-2023-38646" ,
"full_name" : "asepsaepdin\/CVE-2023-38646" ,
"owner" : {
"login" : "asepsaepdin" ,
"id" : 122620685 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4" ,
"html_url" : "https:\/\/github.com\/asepsaepdin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/asepsaepdin\/CVE-2023-38646" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-10-14T15:56:18Z" ,
"updated_at" : "2023-10-14T15:57:18Z" ,
"pushed_at" : "2023-10-14T16:56:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 705088605 ,
"name" : "CVE-2023-38646" ,
"full_name" : "Pyr0sec\/CVE-2023-38646" ,
"owner" : {
"login" : "Pyr0sec" ,
"id" : 74669749 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/74669749?v=4" ,
"html_url" : "https:\/\/github.com\/Pyr0sec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Pyr0sec\/CVE-2023-38646" ,
"description" : "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)" ,
"fork" : false ,
"created_at" : "2023-10-15T01:29:37Z" ,
"updated_at" : "2024-10-02T09:48:29Z" ,
"pushed_at" : "2023-10-15T01:51:31Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 706044373 ,
"name" : "CVE-2023-38646" ,
"full_name" : "birdm4nw\/CVE-2023-38646" ,
"owner" : {
"login" : "birdm4nw" ,
"id" : 81826371 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/81826371?v=4" ,
"html_url" : "https:\/\/github.com\/birdm4nw" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/birdm4nw\/CVE-2023-38646" ,
"description" : "This script is designed to exploit vulnerable Metabase software versions by providing you as attacker a shell." ,
"fork" : false ,
"created_at" : "2023-10-17T07:43:58Z" ,
"updated_at" : "2024-08-10T06:24:08Z" ,
"pushed_at" : "2024-08-10T06:24:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 707752489 ,
"name" : "CVE-2023-38646" ,
"full_name" : "AnvithLobo\/CVE-2023-38646" ,
"owner" : {
"login" : "AnvithLobo" ,
"id" : 64419387 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64419387?v=4" ,
"html_url" : "https:\/\/github.com\/AnvithLobo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/AnvithLobo\/CVE-2023-38646" ,
"description" : "RCE Exploit for CVE-2023-38646" ,
"fork" : false ,
"created_at" : "2023-10-20T15:21:08Z" ,
"updated_at" : "2023-10-20T15:21:15Z" ,
"pushed_at" : "2023-10-27T07:58:14Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 709928112 ,
"name" : "CVE-2023-38646" ,
"full_name" : "Red4mber\/CVE-2023-38646" ,
"owner" : {
"login" : "Red4mber" ,
"id" : 58694886 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/58694886?v=4" ,
"html_url" : "https:\/\/github.com\/Red4mber" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Red4mber\/CVE-2023-38646" ,
"description" : "Python script to exploit CVE-2023-38646 Metabase Pre-Auth RCE via SQL injection" ,
"fork" : false ,
"created_at" : "2023-10-25T17:10:53Z" ,
"updated_at" : "2024-08-30T01:59:34Z" ,
"pushed_at" : "2023-10-26T10:32:23Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 710257770 ,
"name" : "CVE-2023-38646" ,
"full_name" : "junnythemarksman\/CVE-2023-38646" ,
"owner" : {
"login" : "junnythemarksman" ,
"id" : 20056452 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4" ,
"html_url" : "https:\/\/github.com\/junnythemarksman" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/junnythemarksman\/CVE-2023-38646" ,
"description" : "Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2." ,
"fork" : false ,
"created_at" : "2023-10-26T10:37:23Z" ,
"updated_at" : "2024-06-04T10:00:37Z" ,
"pushed_at" : "2024-06-04T10:00:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 715398190 ,
"name" : "CVE-2023-38646" ,
"full_name" : "Mrunalkaran\/CVE-2023-38646" ,
"owner" : {
"login" : "Mrunalkaran" ,
"id" : 12004564 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12004564?v=4" ,
"html_url" : "https:\/\/github.com\/Mrunalkaran" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Mrunalkaran\/CVE-2023-38646" ,
"description" : "Metabase Pre-Auth RCE POC" ,
"fork" : false ,
"created_at" : "2023-11-07T03:57:15Z" ,
"updated_at" : "2023-11-07T04:17:08Z" ,
"pushed_at" : "2023-11-07T05:10:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 716592824 ,
"name" : "CVE-2023-38646" ,
"full_name" : "j0yb0y0h\/CVE-2023-38646" ,
"owner" : {
"login" : "j0yb0y0h" ,
"id" : 143268493 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/143268493?v=4" ,
"html_url" : "https:\/\/github.com\/j0yb0y0h" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/j0yb0y0h\/CVE-2023-38646" ,
"description" : "Code to detect\/exploit vulnerable metabase application" ,
"fork" : false ,
"created_at" : "2023-11-09T13:13:25Z" ,
"updated_at" : "2023-11-09T14:56:15Z" ,
"pushed_at" : "2023-11-09T14:56:12Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 723442683 ,
"name" : "CVE-2023-38646" ,
"full_name" : "Ego1stoo\/CVE-2023-38646" ,
"owner" : {
"login" : "Ego1stoo" ,
"id" : 53305928 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53305928?v=4" ,
"html_url" : "https:\/\/github.com\/Ego1stoo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Ego1stoo\/CVE-2023-38646" ,
"description" : "Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2." ,
"fork" : false ,
"created_at" : "2023-11-25T17:22:22Z" ,
"updated_at" : "2023-11-26T03:22:51Z" ,
"pushed_at" : "2023-11-26T04:01:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 729952479 ,
"name" : "Another-Metabase-RCE-CVE-2023-38646" ,
"full_name" : "0utl4nder\/Another-Metabase-RCE-CVE-2023-38646" ,
"owner" : {
"login" : "0utl4nder" ,
"id" : 117042369 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/117042369?v=4" ,
"html_url" : "https:\/\/github.com\/0utl4nder" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0utl4nder\/Another-Metabase-RCE-CVE-2023-38646" ,
"description" : "Metabase postgres (org.h2.Driver) RCE without INIT" ,
"fork" : false ,
"created_at" : "2023-12-10T21:07:10Z" ,
"updated_at" : "2023-12-12T03:26:37Z" ,
"pushed_at" : "2023-12-12T22:40:44Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 749427663 ,
"name" : "MetabaseRCE_CVE-2023-38646" ,
"full_name" : "Shisones\/MetabaseRCE_CVE-2023-38646" ,
"owner" : {
"login" : "Shisones" ,
"id" : 126447666 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/126447666?v=4" ,
"html_url" : "https:\/\/github.com\/Shisones" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Shisones\/MetabaseRCE_CVE-2023-38646" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-01-28T15:01:40Z" ,
"updated_at" : "2024-02-04T09:59:32Z" ,
"pushed_at" : "2024-02-19T03:59:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 760212653 ,
"name" : "METABASE-RCE-CVE-2023-38646-" ,
"full_name" : "acesoyeo\/METABASE-RCE-CVE-2023-38646-" ,
"owner" : {
"login" : "acesoyeo" ,
"id" : 127269737 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/127269737?v=4" ,
"html_url" : "https:\/\/github.com\/acesoyeo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/acesoyeo\/METABASE-RCE-CVE-2023-38646-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-02-20T01:51:47Z" ,
"updated_at" : "2024-02-20T01:54:06Z" ,
"pushed_at" : "2024-02-20T01:57:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 761543979 ,
"name" : "Exploit-CVE-2023-38646-Metabase" ,
"full_name" : "UserConnecting\/Exploit-CVE-2023-38646-Metabase" ,
"owner" : {
"login" : "UserConnecting" ,
"id" : 97047842 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4" ,
"html_url" : "https:\/\/github.com\/UserConnecting" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-38646-Metabase" ,
"description" : "Exploit for the Remote Code Execution (RCE) vulnerability identified in Metabase versions before 0.46.6.1 (open source) and 1.46.6.1 (Enterprise). Authentication is not required for exploitation." ,
"fork" : false ,
"created_at" : "2024-02-22T02:55:55Z" ,
"updated_at" : "2024-03-01T02:06:33Z" ,
"pushed_at" : "2024-02-22T03:12:11Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 767222866 ,
"name" : "CVE-2023-38646" ,
"full_name" : "DaniTheHack3r\/CVE-2023-38646" ,
"owner" : {
"login" : "DaniTheHack3r" ,
"id" : 51076007 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51076007?v=4" ,
"html_url" : "https:\/\/github.com\/DaniTheHack3r" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/DaniTheHack3r\/CVE-2023-38646" ,
"description" : "CVE-2023-38646 Metabase 0.46.6 exploit" ,
"fork" : false ,
"created_at" : "2024-03-04T23:01:43Z" ,
"updated_at" : "2024-03-04T23:01:48Z" ,
"pushed_at" : "2023-10-11T15:26:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 892415497 ,
"name" : "cve-2023-38646-poc" ,
"full_name" : "XiaomingX\/cve-2023-38646-poc" ,
"owner" : {
"login" : "XiaomingX" ,
"id" : 5387930 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4" ,
"html_url" : "https:\/\/github.com\/XiaomingX" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/XiaomingX\/cve-2023-38646-poc" ,
"description" : "CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点\/api\/setup\/validate时, 对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串, 利用该端点在服务器上执行任意命令, 而无需进行身份验证。" ,
"fork" : false ,
"created_at" : "2024-11-22T04:15:25Z" ,
2025-01-14 03:33:09 +09:00
"updated_at" : "2025-01-13T18:17:49Z" ,
2025-01-08 09:32:44 +09:00
"pushed_at" : "2024-11-22T04:18:53Z" ,
2025-01-14 03:33:09 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2025-01-08 09:32:44 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2025-01-14 03:33:09 +09:00
"watchers" : 5 ,
2025-01-08 09:32:44 +09:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 894667013 ,
"name" : "CVE-2023-38646-PoC-Metabase" ,
"full_name" : "JayRyz\/CVE-2023-38646-PoC-Metabase" ,
"owner" : {
"login" : "JayRyz" ,
"id" : 99511456 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/99511456?v=4" ,
"html_url" : "https:\/\/github.com\/JayRyz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/JayRyz\/CVE-2023-38646-PoC-Metabase" ,
"description" : "Proof-of-Concept script for exploiting CVE-2023-38646. Intended for educational and research purposes only." ,
"fork" : false ,
"created_at" : "2024-11-26T19:05:35Z" ,
"updated_at" : "2024-11-27T16:27:28Z" ,
"pushed_at" : "2024-11-26T20:00:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2023-38646" ,
"cybersecurity" ,
"metabase-vulnerability" ,
"penetration-testing" ,
"poc" ,
"proof-of-concept" ,
"python-exploitation" ,
"rce-exploit" ,
"web-vulnerability"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]