Vulnerability identifier: #VU84821
Vulnerability risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-25814
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
MeterSphere
Web applications /
Modules and components for CMS
Vendor: MeterSphere
Description
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
MeterSphere: 1.0.0, 1.0.1 - 2.7.0, 1.0.2 - 1.9.2, 1.0.3 - 1.11.1, 1.1.0, 1.1.1, 1.1.2, 1.2.0, 1.2.1, 1.3.0, 1.11.2, 1.11.3, 1.12.0, 1.12.1, 1.12.2, 1.12.3, 1.13.0, 1.13.1, 1.13.2, 1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.14.4, 1.14.5, 1.14.6, 1.14.7, 1.15.0, 1.15.1, 1.15.2, 1.15.3, 1.15.4, 1.16.0, 1.16.1, 1.16.2, 1.16.3, 1.16.4, 1.16.5, 1.16.6, 1.17.0, 1.17.1, 1.17.2, 1.17.3, 1.18.0, 1.18.1, 1.18.2, 1.18.3, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.20.0-lts, 1.20.1-lts, 1.20.2-lts, 1.20.3-lts, 1.20.4-lts, 1.20.5-lts, 1.20.6-lts, 1.20.7-lts, 1.20.8-lts, 1.20.9-lts, 1.20.10-lts, 1.20.11-lts, 1.20.12-lts, 1.20.13-lts, 1.20.14-lts, 1.20.15-lts, 1.20.16-lts, 1.20.17-lts, 1.20.18-lts
External links
https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.