Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. io.metersphere/metersphere
  4. ›
  5. CVE-2023-41878

CVE-2023-41878: Use of Hard-coded Credentials

September 27, 2023 (updated September 30, 2023)

MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

  • github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d
  • github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9
  • nvd.nist.gov/vuln/detail/CVE-2023-41878

Code Behaviors & Features

Detect and mitigate CVE-2023-41878 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.10.7

Fixed versions

  • 2.10.7

Solution

Upgrade to version 2.10.7 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-798: Use of Hard-coded Credentials

Source file

maven/io.metersphere/metersphere/CVE-2023-41878.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:49 +0000.