← Back to CVEs
CVE-2023-25573
HIGH8.6
Description
metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE Details
CVSS v3.1 Score8.6
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/9/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
metersphere:metersphere
Weaknesses (CWE)
CWE-862
References
https://github.com/metersphere/metersphere/security/advisories/GHSA-mcwr-j9vm-5g8h(security-advisories@github.com)
https://github.com/metersphere/metersphere/security/advisories/GHSA-mcwr-j9vm-5g8h(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.