CVE-2023-41878

MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*

History

30 Sep 2023, 02:03

Type Values Removed Values Added
First Time Metersphere
Metersphere metersphere
CPE cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*
References (MISC) https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9 - (MISC) https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9 - Patch, Third Party Advisory
References (MISC) https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d - (MISC) https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2023-12-10 15:14


NVD link : CVE-2023-41878

Mitre link : CVE-2023-41878

CVE.ORG link : CVE-2023-41878


JSON object : View

Products Affected

metersphere

  • metersphere
CWE
CWE-798

Use of Hard-coded Credentials