Description
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12637 | Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator. |
References
| Link | Providers |
|---|---|
| https://docs.rapid7.com/release-notes/metasploit/20230130/ |
|
History
Tue, 25 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2025-03-25T19:28:44.145Z
Reserved: 2023-01-31T17:28:37.548Z
Link: CVE-2023-0599
Updated: 2024-08-02T05:17:50.108Z
Status : Modified
Published: 2023-02-01T23:15:09.407
Modified: 2024-11-21T07:37:27.917
Link: CVE-2023-0599
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD