MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere's origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/metersphere/metersphere/commit/d0f95b50737c941b29d507a4cc3545f2dc6ab121 | Patch Third Party Advisory |
https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-12-27T23:57:42.208Z
Updated:
Reserved: 2022-01-19T21:23:53.798Z
Link: CVE-2022-23544
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-28T00:15:13.567
Modified: 2023-01-05T04:52:16.033
Link: CVE-2022-23544
JSON object: View
Redhat Information
No data.