{"api_version":"1","generated_at":"2026-04-15T05:25:00+00:00","cve":"CVE-2023-37461","urls":{"html":"https://cve.report/CVE-2023-37461","api":"https://cve.report/api/cve/CVE-2023-37461.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-37461","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-37461"},"summary":{"title":"CVE-2023-37461","description":"Metersphere is an opensource testing framework. Files uploaded to Metersphere may define a `belongType` value with a relative path like `../../../../` which may cause metersphere to attempt to overwrite an existing file in the defined location or to create a new file. Attackers would be limited to overwriting files that the metersphere process has access to. This issue has been addressed in version 2.10.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-07-17 20:15:00","updated_at":"2023-07-27 03:45:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v","refsource":"MISC","tags":[],"title":"metersphere 存在路径穿越漏洞 · Advisory · metersphere/metersphere · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-37461","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37461","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"37461","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"metersphere","cpe5":"metersphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-37461","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Metersphere is an opensource testing framework. Files uploaded to Metersphere may define a `belongType` value with a relative path like `../../../../` which may cause metersphere to attempt to overwrite an existing file in the defined location or to create a new file. Attackers would be limited to overwriting files that the metersphere process has access to. This issue has been addressed in version 2.10.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","cweId":"CWE-22"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"metersphere","product":{"product_data":[{"product_name":"metersphere","version":{"version_data":[{"version_affected":"=","version_value":"< 2.10.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v","refsource":"MISC","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v"}]},"source":{"advisory":"GHSA-xfr9-jgfp-fx3v","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-17 20:15:00","lastModifiedDate":"2023-07-27 03:45:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*","versionEndExcluding":"2.10.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}