CVE-2022-23512

MeterSphere is a one-stop open source continuous testing platform. Versions prior to 2.4.1 are vulnerable to Path Injection in ApiTestCaseService::deleteBodyFiles which takes a user-controlled string id and passes it to ApiTestCaseService, which uses the user-provided value (testId) in new File(BODY_FILE_DIR + "/" + testId), being deleted later by file.delete(). By adding some camouflage parameters to the url, an attacker can target files on the server. The vulnerability has been fixed in v2.4.1.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:*

History

16 Dec 2022, 19:34

Type Values Removed Values Added
CPE cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:*
References (MISC) https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27 - (MISC) https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27 - Exploit, Patch, Third Party Advisory
First Time Metersphere
Metersphere metersphere
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

14 Dec 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-14 14:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-23512

Mitre link : CVE-2022-23512

CVE.ORG link : CVE-2022-23512


JSON object : View

Products Affected

metersphere

  • metersphere
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')