Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-25573
HistoryMar 09, 2023 - 4:33 p.m.

CVE-2023-25573 Improper access control to download file in metersphere

2023-03-0916:33:40
CWE-862
GitHub_M
www.cve.org
3
cve-2023-25573
improper access control
metersphere
file download
authentication vulnerability
version 1.20.20
version 2.7.1
upgrade

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.8

Confidence

High

EPSS

0.117

Percentile

95.4%

metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in /api/jmeter/download/files, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "metersphere",
    "product": "metersphere",
    "versions": [
      {
        "version": "< 1.20.20 lts",
        "status": "affected"
      },
      {
        "version": ">= 2.0.0, < 2.7.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.8

Confidence

High

EPSS

0.117

Percentile

95.4%

Related for CVELIST:CVE-2023-25573