S4E

Metabase Installation Page Exposure Scanner

This scanner detects the use of Metabase Installation Page Exposure in digital assets. Inappropriate exposure of the installation page can allow unauthorized database setup and configuration. It identifies potential risks, ensuring digital asset safety and integrity.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

19 days 19 hours

Scan only one

URL

Toolbox

Metabase is a popular open-source business intelligence tool that allows users to ask questions about their data and visualize the answers. It is widely used by businesses and organizations for data analysis and reporting purposes. Metabase is typically employed by data analysts, business users, and IT professionals to create and share dashboards and visual reports. The primary aim of Metabase is to provide an easy and user-friendly way for non-technical users to leverage data insights. The application can be integrated with various databases and platforms to pull and analyze data effectively. As such, ensuring that its setup and configuration are secure is crucial to protect sensitive data.

The vulnerability detected in this scanner pertains to the exposure of the Metabase installation page. Improper access controls can lead to the installation page being accessible to unauthorized users. When exposed, malicious actors can gain the ability to set up or reconfigure the database without proper authorization. This exposure can lead to unauthorized database modifications and potential data breaches. The scanner identifies whether the installation page is exposed unnecessarily, preventing security risks.

Technical details of this vulnerability revolve around the exposure of the installation endpoint, typically found at "/setup". The vulnerability is triggered when this endpoint is accessible without proper security measures. The scanner checks for status code 200 and specific elements in the page body indicating an exposed setup page. The presence of specific keywords like "has-user-setup":false and _metabaseBootstrap in the body confirms the exposure of the setup process.

Exploiting this exposure could allow unauthorized setup or modification of database configurations, leading to unauthorized access to sensitive data. Malicious entities could set up backdoors, access user information, or modify data without detection. Such unauthorized actions could severely impact data confidentiality, integrity, and availability. Moreover, it might lead to reputational damage and non-compliance with data protection regulations.

REFERENCES

Get started to protecting your digital assets