MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere's origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj | Exploit Patch Third Party Advisory |
https://github.com/metersphere/metersphere/commit/d0f95b50737c941b29d507a4cc3545f2dc6ab121 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-12-27 16:15
Updated : 2023-01-04 20:52
NVD link : CVE-2022-23544
Mitre link : CVE-2022-23544
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
metersphere
- metersphere