{"api_version":"1","generated_at":"2026-04-15T03:34:59+00:00","cve":"CVE-2023-41878","urls":{"html":"https://cve.report/CVE-2023-41878","api":"https://cve.report/api/cve/CVE-2023-41878.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41878","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41878"},"summary":{"title":"CVE-2023-41878","description":"MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-09-27 15:19:00","updated_at":"2023-09-30 02:03:00"},"problem_types":["CWE-798"],"metrics":[],"references":[{"url":"https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d","name":"https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d","refsource":"MISC","tags":[],"title":"fix: 修复selenium弱密码的问题 · metersphere/installer@02dd31c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9","refsource":"MISC","tags":[],"title":"Weak password of selenium VNC · Advisory · metersphere/metersphere · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41878","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41878","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41878","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"metersphere","cpe5":"metersphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-41878","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-798: Use of Hard-coded Credentials","cweId":"CWE-798"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"metersphere","product":{"product_data":[{"product_name":"metersphere","version":{"version_data":[{"version_affected":"=","version_value":"< 2.10.7 LTS"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9","refsource":"MISC","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9"},{"url":"https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d","refsource":"MISC","name":"https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d"}]},"source":{"advisory":"GHSA-88vv-6rm4-59h9","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.6,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-27 15:19:00","lastModifiedDate":"2023-09-30 02:03:00","problem_types":["CWE-798"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*","versionEndExcluding":"2.10.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}