.. / CVE-2022-23544

Exploit for MeterSphere < 2.5.0 SSRF (CVE-2022-23544)

Description:

MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in IssueProxyResourceService::getMdImageByUrl allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere’s origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.

Nuclei Template

View the template here CVE-2022-23544.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-23544.yaml
Copy

References:

https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj
https://github.com/metersphere/metersphere/commit/d0f95b50737c941b29d507a4cc3545f2dc6ab121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23544
https://nvd.nist.gov/vuln/detail/CVE-2022-23544