MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d | Patch |
https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9 | Patch Third Party Advisory |
Configurations
History
30 Sep 2023, 02:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:* | |
First Time |
Metersphere metersphere
Metersphere |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d - Patch |
27 Sep 2023, 15:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 15:19
Updated : 2024-02-28 20:33
NVD link : CVE-2023-41878
Mitre link : CVE-2023-41878
CVE.ORG link : CVE-2023-41878
JSON object : View
Products Affected
metersphere
- metersphere
CWE
CWE-798
Use of Hard-coded Credentials