Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-12637 Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-03-25T19:28:44.145Z

Reserved: 2023-01-31T17:28:37.548Z

Link: CVE-2023-0599

cve-icon Vulnrichment

Updated: 2024-08-02T05:17:50.108Z

cve-icon NVD

Status : Modified

Published: 2023-02-01T23:15:09.407

Modified: 2024-11-21T07:37:27.917

Link: CVE-2023-0599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.