#VU84821 Path traversal in MeterSphere - CVE-2023-25814


Vulnerability identifier: #VU84821

Vulnerability risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-25814

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
MeterSphere
Web applications / Modules and components for CMS

Vendor: MeterSphere

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

MeterSphere: 1.0.0, 1.0.1 - 2.7.0, 1.0.2 - 1.9.2, 1.0.3 - 1.11.1, 1.1.0, 1.1.1, 1.1.2, 1.2.0, 1.2.1, 1.3.0, 1.11.2, 1.11.3, 1.12.0, 1.12.1, 1.12.2, 1.12.3, 1.13.0, 1.13.1, 1.13.2, 1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.14.4, 1.14.5, 1.14.6, 1.14.7, 1.15.0, 1.15.1, 1.15.2, 1.15.3, 1.15.4, 1.16.0, 1.16.1, 1.16.2, 1.16.3, 1.16.4, 1.16.5, 1.16.6, 1.17.0, 1.17.1, 1.17.2, 1.17.3, 1.18.0, 1.18.1, 1.18.2, 1.18.3, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.20.0-lts, 1.20.1-lts, 1.20.2-lts, 1.20.3-lts, 1.20.4-lts, 1.20.5-lts, 1.20.6-lts, 1.20.7-lts, 1.20.8-lts, 1.20.9-lts, 1.20.10-lts, 1.20.11-lts, 1.20.12-lts, 1.20.13-lts, 1.20.14-lts, 1.20.15-lts, 1.20.16-lts, 1.20.17-lts, 1.20.18-lts


External links
https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability