{"api_version":"1","generated_at":"2026-04-15T05:24:36+00:00","cve":"CVE-2023-38494","urls":{"html":"https://cve.report/CVE-2023-38494","api":"https://cve.report/api/cve/CVE-2023-38494.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-38494","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-38494"},"summary":{"title":"CVE-2023-38494","description":"MeterSphere is an open-source continuous testing platform. Prior to version 2.10.4 LTS, some interfaces of the Cloud version of MeterSphere do not have configuration permissions, and are sensitively leaked by attackers. Version 2.10.4 LTS contains a patch for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-08-04 16:15:00","updated_at":"2023-08-08 20:24:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253","refsource":"MISC","tags":[],"title":"cloud版MeterSphere接口未做鉴权泄露部分敏感数据 · Advisory · metersphere/metersphere · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/metersphere/metersphere/commit/a23f75d93b666901fd148d834df9384f6f24cf28","name":"https://github.com/metersphere/metersphere/commit/a23f75d93b666901fd148d834df9384f6f24cf28","refsource":"MISC","tags":[],"title":"fix: 增加用户组接口的权限校验 · metersphere/metersphere@a23f75d · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-38494","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38494","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"38494","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"metersphere","cpe5":"metersphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-38494","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"MeterSphere is an open-source continuous testing platform. Prior to version 2.10.4 LTS, some interfaces of the Cloud version of MeterSphere do not have configuration permissions, and are sensitively leaked by attackers. Version 2.10.4 LTS contains a patch for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"metersphere","product":{"product_data":[{"product_name":"metersphere","version":{"version_data":[{"version_affected":"=","version_value":"< 2.10.4-LTS"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253","refsource":"MISC","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253"},{"url":"https://github.com/metersphere/metersphere/commit/a23f75d93b666901fd148d834df9384f6f24cf28","refsource":"MISC","name":"https://github.com/metersphere/metersphere/commit/a23f75d93b666901fd148d834df9384f6f24cf28"}]},"source":{"advisory":"GHSA-fjp5-95pv-5253","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-04 16:15:00","lastModifiedDate":"2023-08-08 20:24:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*","versionEndExcluding":"2.10.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}