cve/2023/CVE-2023-32699.md
2024-06-18 02:51:15 +02:00

18 lines
1.3 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-32699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32699)
![](https://img.shields.io/static/v1?label=Product&message=metersphere&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.10%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen)
### Description
MeterSphere is an open source continuous testing platform. Version 2.9.1 and prior are vulnerable to denial of service. The `checkUserPassword` method is used to check whether the password provided by the user matches the password saved in the database, and the `CodingUtil.md5` method is used to encrypt the original password with MD5 to ensure that the password will not be saved in plain text when it is stored. If a user submits a very long password when logging in, the system will be forced to execute the long password MD5 encryption process, causing the server CPU and memory to be exhausted, thereby causing a denial of service attack on the server. This issue is fixed in version 2.10.0-lts with a maximum password length.
### POC
#### Reference
- https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7
#### Github
No PoCs found on GitHub currently.