Vulnerability Details : CVE-2023-41878
MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Products affected by CVE-2023-41878
- cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41878
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41878
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
4.6
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L |
2.1
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2023-41878
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-41878
-
https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d
fix: 修复selenium弱密码的问题 · metersphere/installer@02dd31c · GitHubPatch
-
https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9
Weak password of selenium VNC · Advisory · metersphere/metersphere · GitHubPatch;Third Party Advisory
Jump to