diff --git a/CVE-2023-25814.md b/CVE-2023-25814.md new file mode 100644 index 0000000..a48beff --- /dev/null +++ b/CVE-2023-25814.md @@ -0,0 +1,12 @@ +## MeterSphere File Read Vulnerability(CVE-2023-25814) + +|   **Vulnerability** | **MeterSphere File Read Vulnerability(CVE-2023-25814)** | +| :----: | :-----| +|  **Chinese name** | MeterSphere 文件读取漏洞(CVE-2023-25814) | +| **CVSS core** | 7.5 | +| **FOFA Query** (click to view the results directly)| [app="FIT2CLOUD-MeterSphere"](https://en.fofa.info/result?qbase64=YXBwPSJGSVQyQ0xPVUQtTWV0ZXJTcGhlcmUi) | +| **Number of assets affected** | 2552 | +| **Description** | MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing, and is fully compatible with mainstream open source standards such as JMeter and Selenium. MeterSphere has an unauthorized arbitrary file read vulnerability. | +| **Impact** | Attackers can use this vulnerability to read the leaked source code, database configuration files, etc., resulting in an extremely insecure website. | + +![](https://s3.bmp.ovh/imgs/2023/04/07/4fd8616dc5a1c81c.gif)