nomisec
WORKING POC
55 stars
by Boogipop · remote
https://github.com/Boogipop/MetabaseRceTools
This repository contains a functional GUI-based exploit tool for CVE-2023-38646, targeting Metabase. It includes modules for detecting unauthenticated tokens, executing commands, and injecting memory shells (e.g., Godzilla).
Classification
Working Poc 95%
Target:
Metabase (version not specified)
No auth needed
Prerequisites:
Access to Metabase instance · Network connectivity to target
nomisec
WORKING POC
27 stars
by robotmikhro · remote
https://github.com/robotmikhro/CVE-2023-38646
This repository contains functional exploit code for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages a malicious database connection string to execute arbitrary commands via Java Runtime exec().
Classification
Working Poc 95%
Target:
Metabase (pre-0.46.6.1)
No auth needed
Prerequisites:
Network access to Metabase instance · Metabase setup token retrieval
nomisec
WORKING POC
20 stars
by securezeron · remote
https://github.com/securezeron/CVE-2023-38646
This repository contains functional exploit code for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The PoC includes a scanner to detect leaking setup tokens and a reverse shell exploit leveraging H2 database trigger injection.
Classification
Working Poc 95%
Target:
Metabase (versions with exposed setup tokens)
No auth needed
Prerequisites:
Target Metabase instance with exposed /api/session/properties endpoint · Network access to the target · Listener setup for reverse shell
nomisec
WORKING POC
15 stars
by 0xrobiul · remote
https://github.com/0xrobiul/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages the H2 database driver to execute arbitrary commands via a crafted payload sent to the `/api/setup/validate` endpoint.
Classification
Working Poc 95%
Target:
Metabase (versions affected by CVE-2023-38646)
No auth needed
Prerequisites:
Target URL · Setup-Token from `/api/session/properties` · Burp Collaborator client for callback verification
nomisec
WORKING POC
12 stars
by shamo0 · remote
https://github.com/shamo0/CVE-2023-38646-PoC
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The PoC leverages H2 database JDBC URL injection to execute arbitrary commands via a crafted payload sent to the `/api/setup/validate` endpoint.
Classification
Working Poc 95%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Setup token from `/api/session/properties` · Collaborator URL for callback verification
nomisec
WORKING POC
10 stars
by Pyr0sec · remote
https://github.com/Pyr0sec/CVE-2023-38646
This repository contains a functional Python exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious JDBC connection string to execute arbitrary commands via Java runtime execution.
Classification
Working Poc 95%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Setup-Token from /api/session/properties
nomisec
WORKING POC
8 stars
by kh4sh3i · remote
https://github.com/kh4sh3i/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution (RCE) vulnerability in Metabase. The exploit leverages the H2 database driver to execute arbitrary commands via a crafted payload sent to the `/api/setup/validate` endpoint.
Classification
Working Poc 95%
Target:
Metabase (open source and Enterprise)
No auth needed
Prerequisites:
Target URL · Setup-Token from `/api/session/properties` · Burp Collaborator URL
nomisec
WORKING POC
6 stars
by Pumpkin-Garden · remote
https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious database connection string to execute arbitrary commands via a crafted payload.
Classification
Working Poc 95%
Target:
Metabase (Enterprise and Open Source versions)
No auth needed
Prerequisites:
Target Metabase instance with vulnerable version · Network access to the target · Listener setup for reverse shell
nomisec
WORKING POC
3 stars
by nickswink · remote
https://github.com/nickswink/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious database connection string to execute arbitrary commands via a reverse shell.
Classification
Working Poc 95%
Target:
Metabase (versions affected by CVE-2023-38646)
No auth needed
Prerequisites:
Network access to the target Metabase instance · A listener set up for the reverse shell
nomisec
WORKING POC
3 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, targeting Metabase servers. The exploit leverages a command injection vulnerability via crafted database connection strings to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Metabase (versions affected by CVE-2023-38646)
No auth needed
Prerequisites:
Network access to the target Metabase server · Python 3 environment with required dependencies
nomisec
WORKING POC
2 stars
by JayRyz · remote
https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase
This repository contains a functional Python-based exploit for CVE-2023-38646, targeting Metabase. The exploit automates session token retrieval and crafts a malicious payload to achieve remote command execution via a reverse shell.
Classification
Working Poc 95%
Target:
Metabase
No auth needed
Prerequisites:
Python 3.7+ · requests library · listening netcat instance
nomisec
WORKING POC
2 stars
by m3m0o · remote
https://github.com/m3m0o/metabase-pre-auth-rce-poc
This repository contains a functional Python exploit for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages a malicious database connection string to execute arbitrary commands via a JavaScript trigger in the H2 database engine.
Classification
Working Poc 95%
Target:
Metabase < 0.46.6.1 (open-source) and < 1.46.6.1 (enterprise)
No auth needed
Prerequisites:
Target URL · Setup token from /api/session/properties · Command to execute
nomisec
WORKING POC
2 stars
by Red4mber · remote
https://github.com/Red4mber/CVE-2023-38646
This repository contains a functional Python exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase via SQL injection. The exploit retrieves a setup token and crafts a malicious payload to achieve RCE.
Classification
Working Poc 100%
Target:
Metabase v0.46.6
No auth needed
Prerequisites:
Target must be running a vulnerable version of Metabase · Network access to the target
nomisec
SCANNER
2 stars
by Xuxfff · infoleak
https://github.com/Xuxfff/CVE-2023-38646-Poc
The repository contains a Python script that checks for the presence of CVE-2023-38646 in Metabase by sending crafted HTTP requests to validate the vulnerability. It does not exploit the vulnerability but detects it by analyzing responses.
Classification
Scanner 90%
Target:
Metabase (Enterprise and Open Source versions)
No auth needed
Prerequisites:
Network access to the target Metabase instance
nomisec
WORKING POC
1 stars
by UserConnecting · remote
https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase
This repository contains a functional Python exploit for CVE-2023-38646, targeting Metabase versions before 0.46.6.1 (open source) and 1.46.6.1 (Enterprise). The exploit leverages a pre-authentication RCE vulnerability by crafting a malicious payload to execute arbitrary commands or establish a reverse shell.
Classification
Working Poc 95%
Target:
Metabase (open source < 0.46.6.1, Enterprise < 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Setup token (obtained from /api/session/properties)
nomisec
WORKING POC
1 stars
by 0utl4nder · remote
https://github.com/0utl4nder/Another-Metabase-RCE-CVE-2023-38646
This repository provides a functional exploit for CVE-2023-38646, a pre-auth RCE in Metabase, by leveraging a crafted H2 database connection string to execute arbitrary shell commands via JavaScript injection in a trigger. It extends the original exploit to avoid 'database already in use' errors by using PostgreSQL as the engine while still targeting H2.
Classification
Working Poc 90%
Target:
Metabase (versions affected by CVE-2023-38646)
No auth needed
Prerequisites:
Network access to the Metabase instance · Metabase instance vulnerable to CVE-2023-38646
nomisec
WORKING POC
1 stars
by alexandre-pecorilla · remote
https://github.com/alexandre-pecorilla/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious database connection string to execute arbitrary commands via a crafted H2 database trigger.
Classification
Working Poc 100%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Setup-Token from /api/session/properties · Attacker-controlled IP and port for reverse shell
nomisec
WORKING POC
1 stars
by Zenmovie · remote
https://github.com/Zenmovie/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, targeting Metabase's setup validation endpoint to achieve remote code execution (RCE) via a crafted payload in the setup token. The exploit leverages a base64-encoded reverse shell payload and manipulates the database connection string to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Metabase (version not explicitly specified, but likely pre-patch versions)
No auth needed
Prerequisites:
Network access to the Metabase instance · Metabase instance in an uninitialized or vulnerable state
nomisec
WORKING POC
1 stars
by fidjiw · remote
https://github.com/fidjiw/CVE-2023-38646-POC
This PoC exploits CVE-2023-38646 by sending a crafted POST request to the target URL with a malicious payload that leverages H2 database JDBC URL injection to execute arbitrary commands. The payload uses a collaborator URL to exfiltrate data, confirming successful exploitation.
Classification
Working Poc 95%
Target:
Metabase (version not specified)
Auth required
Prerequisites:
Target URL · Valid setup token · Collaborator URL for exfiltration
nomisec
WORKING POC
by BreezeGalaxy · remote-auth
https://github.com/BreezeGalaxy/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, targeting Metabase's authentication bypass and RCE via malicious H2 database connection strings. The exploit automates account creation, login, and payload delivery to achieve remote code execution.
Classification
Working Poc 95%
Target:
Metabase v0.46.6
No auth needed
Prerequisites:
Network access to Metabase instance · Metabase in uninitialized state (or vulnerable version)
nomisec
WORKING POC
by cleanmgr112 · remote
https://github.com/cleanmgr112/cve-2023-38646-poc
This repository contains functional exploit code for CVE-2023-38646, targeting Metabase. It includes a scanner to retrieve setup tokens and a reverse shell payload that leverages the vulnerability to achieve remote code execution via a crafted database connection string.
Classification
Working Poc 95%
Target:
Metabase (version not explicitly specified, but likely pre-0.46.6)
No auth needed
Prerequisites:
Network access to the Metabase instance · Metabase instance with setup token exposed
nomisec
WORKING POC
by birdm4nw · remote
https://github.com/birdm4nw/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages a malicious JDBC connection string to execute arbitrary commands via a JavaScript trigger in the H2 database engine.
Classification
Working Poc 95%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Network access to the Metabase instance · Listener setup for reverse shell
nomisec
WORKING POC
by junnythemarksman · remote
https://github.com/junnythemarksman/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious JDBC connection string to execute arbitrary commands via a reverse shell payload.
Classification
Working Poc 95%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Setup token from /api/session/properties · Attacker-controlled IP and port for reverse shell
nomisec
WORKING POC
by acesoyeo · poc
https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-
This repository contains a functional exploit for CVE-2023-38646, leveraging a local privilege escalation (LPE) technique via overlayfs and capability manipulation to gain root access. The exploit uses `unshare`, `setcap`, and `overlayfs` to escalate privileges and spawn a root shell.
Classification
Working Poc 90%
Target:
Metabase (version not specified)
No auth needed
Prerequisites:
Local access to the target system · Presence of Python3 and overlayfs support
nomisec
WORKING POC
by Shisones · remote
https://github.com/Shisones/MetabaseRCE_CVE-2023-38646
This repository contains a functional Rust-based PoC for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages a setup token from /api/session/properties to send a base64-encoded payload via the /api/setup/validate endpoint, executing arbitrary commands through a malicious H2 database trigger.
Classification
Working Poc 95%
Target:
Metabase (versions before 0.46.6.1 and 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Setup token from /api/session/properties · Network access to the target
nomisec
WORKING POC
by Ego1stoo · remote
https://github.com/Ego1stoo/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages an exposed setup token to inject a malicious payload via the API, resulting in arbitrary command execution on the target system.
Classification
Working Poc 95%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Network access to the target Metabase instance · Target must be running a vulnerable version of Metabase
nomisec
WORKING POC
by j0yb0y0h · poc
https://github.com/j0yb0y0h/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, targeting Metabase applications. The exploit leverages a vulnerability in the setup validation endpoint to achieve remote code execution via a crafted payload embedded in a database connection string.
Classification
Working Poc 95%
Target:
Metabase (version not specified)
No auth needed
Prerequisites:
Network access to the target Metabase instance · Target must be vulnerable to CVE-2023-38646
nomisec
WORKING POC
by Mrunalkaran · remote
https://github.com/Mrunalkaran/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious JDBC connection string to execute arbitrary commands via a reverse shell payload.
Classification
Working Poc 95%
Target:
Metabase (open source before 0.46.6.1, Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Target URL · Attacker IP · Port for reverse shell
nomisec
WORKING POC
by AnvithLobo · remote
https://github.com/AnvithLobo/CVE-2023-38646
This repository contains a functional Python exploit for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages a malicious JDBC connection string to execute arbitrary commands via a reverse shell payload.
Classification
Working Poc 100%
Target:
Metabase (versions before 0.46.6.1 and Enterprise before 1.46.6.1)
No auth needed
Prerequisites:
Network access to the Metabase instance · Listener set up for reverse shell
nomisec
WORKING POC
by threatHNTR · remote
https://github.com/threatHNTR/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages the setup token endpoint to inject a malicious JDBC connection string, triggering arbitrary command execution via a reverse shell.
Classification
Working Poc 95%
Target:
Metabase (open-source business intelligence tool)
No auth needed
Prerequisites:
Network access to the target Metabase instance · A listener set up for the reverse shell
nomisec
WORKING POC
by asepsaepdin · remote
https://github.com/asepsaepdin/CVE-2023-38646
This repository contains functional exploit code for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages the exposed setup token to execute arbitrary commands via a crafted payload in the setup validation endpoint.
Classification
Working Poc 95%
Target:
Metabase (versions prior to fix)
No auth needed
Prerequisites:
Exposed Metabase instance with setup token accessible · Network connectivity to target
nomisec
WORKING POC
by passwa11 · remote
https://github.com/passwa11/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication remote code execution vulnerability in Metabase. The exploit leverages a malicious database connection string to execute arbitrary commands via a reverse shell.
Classification
Working Poc 95%
Target:
Metabase (version not specified)
No auth needed
Prerequisites:
Target URL · Attacker-controlled IP and port for reverse shell
nomisec
WORKING POC
by DaniTheHack3r · poc
https://github.com/DaniTheHack3r/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, targeting Metabase 0.46.6. The exploit leverages a mishandled database connection string to achieve remote code execution by injecting a malicious trigger via a crafted payload.
Classification
Working Poc 95%
Target:
Metabase 0.46.6
No auth needed
Prerequisites:
Target URL · Command to execute · Optional proxy for routing traffic
nomisec
WORKING POC
by CN016 · remote
https://github.com/CN016/Metabase-H2-CVE-2023-38646-
This PoC exploits CVE-2023-38646 in Metabase by leveraging an H2 database trigger to achieve remote code execution (RCE). It retrieves a setup token, crafts a malicious payload with a JavaScript trigger, and sends it to the Metabase API to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Metabase (H2 database)
No auth needed
Prerequisites:
Access to the Metabase API endpoint · Metabase instance vulnerable to CVE-2023-38646
nomisec
WORKING POC
by yxl2001 · remote
https://github.com/yxl2001/CVE-2023-38646
This repository contains functional exploit code for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages a setup token leak and SQL injection to execute arbitrary commands via a reverse shell payload.
Classification
Working Poc 95%
Target:
Metabase (versions prior to 0.46.6.1)
No auth needed
Prerequisites:
Network access to the Metabase instance · Listener setup for reverse shell
nomisec
WORKING POC
by raytheon0x21 · poc
https://github.com/raytheon0x21/CVE-2023-38646
This repository contains a functional exploit for CVE-2023-38646, a pre-authentication RCE vulnerability in Metabase. The exploit leverages the setup token endpoint to inject a malicious JDBC connection string, triggering arbitrary command execution via a reverse shell.
Classification
Working Poc 95%
Target:
Metabase (versions affected by CVE-2023-38646)
No auth needed
Prerequisites:
Network access to the Metabase instance · Listener setup for reverse shell
nomisec
WORKING POC
by Any3ite · remote
https://github.com/Any3ite/cve-2023-38646-metabase-ReverseShell
This repository contains a functional Go-based exploit for CVE-2023-38646, targeting Metabase. The exploit leverages a setup token to execute a reverse shell via a crafted database connection string, exploiting a vulnerability in the setup validation endpoint.
Classification
Working Poc 95%
Target:
Metabase (version not specified)
No auth needed
Prerequisites:
Target Metabase instance accessible via HTTP/HTTPS · Network connectivity to the attacker's VPS for reverse shell
vulncheck_xdb
WORKING POC
remote
https://github.com/massco99/Analytics-htb-Rce
This repository contains a functional exploit for CVE-2023-38646, targeting Metabase's pre-authentication RCE vulnerability via a crafted setup token and malicious database connection string. The exploit leverages JavaScript injection in an H2 database trigger to execute a reverse shell.
Classification
Working Poc 95%
Target:
Metabase (pre-authentication)
No auth needed
Prerequisites:
network access to Metabase instance · listener setup for reverse shell
vulncheck_xdb
WORKING POC
infoleak
https://github.com/MzzdToT/HAC_Bored_Writing
The repository contains a functional exploit for CVE-2023-38646, targeting Apache Solr's arbitrary file read vulnerability. The script includes methods to check for vulnerability, enable remote streaming, and execute commands to read arbitrary files.
Classification
Working Poc 95%
Target:
Apache Solr <= 8.8.1
No auth needed
Prerequisites:
Access to the Solr admin interface · Network connectivity to the target
metasploit
WORKING POC
EXCELLENT
by h00die, Maxwell Garrett, Shubham Shah · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/metabase_setup_token_rce.rb
This Metasploit module exploits CVE-2023-38646 in Metabase versions before 0.46.6.1 by leveraging an exposed setup token to execute arbitrary commands via a malicious H2 database connection string with a JavaScript trigger.
Classification
Working Poc 100%
Target:
Metabase < 0.46.6.1
No auth needed
Prerequisites:
Network access to Metabase instance · Metabase version < 0.46.6.1