MeterSphere is an open source continuous testing platform. Version 2.9.1 and prior are vulnerable to denial of service. The `checkUserPassword` method is used to check whether the password provided by the user matches the password saved in the database, and the `CodingUtil.md5` method is used to encrypt the original password with MD5 to ensure that the password will not be saved in plain text when it is stored. If a user submits a very long password when logging in, the system will be forced to execute the long password MD5 encryption process, causing the server CPU and memory to be exhausted, thereby causing a denial of service attack on the server. This issue is fixed in version 2.10.0-lts with a maximum password length.
References
Link | Resource |
---|---|
https://github.com/metersphere/metersphere/commit/c59e381d368990214813085a1a4877c5ef865411 | Patch |
https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7 | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-05-30T18:59:26.174Z
Updated: 2023-05-30T18:59:26.174Z
Reserved: 2023-05-11T16:33:45.734Z
Link: CVE-2023-32699
JSON object: View
NVD Information
Status : Modified
Published: 2023-05-30T19:15:10.103
Modified: 2023-11-07T04:14:39.800
Link: CVE-2023-32699
JSON object: View
Redhat Information
No data.
CWE