.. / CVE-2023-25573

Exploit for Metersphere - Arbitrary File Read (CVE-2023-25573)

Description:

Metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in /api/jmeter/download/files, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1

Nuclei Template

View the template here CVE-2023-25573.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-25573.yaml
Copy

References:

https://github.com/metersphere/metersphere/security/advisories/GHSA-mcwr-j9vm-5g8h
https://nvd.nist.gov/vuln/detail/CVE-2023-25573
https://github.com/KayCHENvip/vulnerability-poc
https://github.com/20142995/sectool
https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metersphere%20file%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2023-25573.md