Vulnerability Description
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rapid7 | Metasploit | <= 4.21.2 |
Related Weaknesses (CWE)
References
- https://docs.rapid7.com/release-notes/metasploit/20230130/Release NotesVendor Advisory
- https://docs.rapid7.com/release-notes/metasploit/20230130/Release NotesVendor Advisory
FAQ
What is CVE-2023-0599?
CVE-2023-0599 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenti...
How severe is CVE-2023-0599?
CVE-2023-0599 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0599?
Check the references section above for vendor advisories and patch information. Affected products include: Rapid7 Metasploit.