CVE-2023-32699
CVSS V2 None
CVSS V3 None
Description
MeterSphere is an open source continuous testing platform. Version 2.9.1 and prior are vulnerable to denial of service. The `checkUserPassword` method is used to check whether the password provided by the user matches the password saved in the database, and the `CodingUtil.md5` method is used to encrypt the original password with MD5 to ensure that the password will not be saved in plain text when it is stored. If a user submits a very long password when logging in, the system will be forced to execute the long password MD5 encryption process, causing the server CPU and memory to be exhausted, thereby causing a denial of service attack on the server. This issue is fixed in version 2.10.0-lts with a maximum password length.
Overview
- CVE ID
- CVE-2023-32699
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-05-30T18:59:26.174Z
- Last Modified Date
- 2023-05-30T18:59:26.174Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7 | x_refsource_CONFIRM |
https://github.com/metersphere/metersphere/commit/c59e381d368990214813085a1a4877c5ef865411 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-32699 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32699 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 11:35:48 | Added to TrackCVE |