{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-39360","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2025-04-23T16:42:39.520Z","dateReserved":"2022-09-02T00:00:00.000Z","datePublished":"2022-10-26T00:00:00.000Z"},"containers":{"cna":{"title":"Metabase SSO users able to circumvent IdP login by doing password reset","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2022-10-26T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login."}],"affected":[{"vendor":"metabase","product":"metabase","versions":[{"version":"< 0.41.9","status":"affected"},{"version":">= 0.42.0, < 0.42.6","status":"affected"},{"version":">= 0.43.0, < 0.43.7","status":"affected"},{"version":">= 0.44.0, < 0.44.5","status":"affected"},{"version":">= 1.0.0, < 1.41.9","status":"affected"},{"version":">= 1.42.0, < 1.42.6","status":"affected"},{"version":">= 1.43.0, < 1.43.7","status":"affected"},{"version":">= 1.44.0, < 1.44.5","status":"affected"}]}],"references":[{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc"},{"url":"https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-304: Missing Critical Step in Authentication","cweId":"CWE-304"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287: Improper Authentication","cweId":"CWE-287"}]}],"source":{"advisory":"GHSA-gw4g-ww2m-v7vc","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:00:44.174Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc","tags":["x_transferred"]},{"url":"https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:55:35.522682Z","id":"CVE-2022-39360","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T16:42:39.520Z"}}]}}