Description
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
Published: 2023-02-01
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-12637 Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
History

Tue, 25 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Rapid7 Metasploit
cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-03-25T19:28:44.145Z

Reserved: 2023-01-31T17:28:37.548Z

Link: CVE-2023-0599

cve-icon Vulnrichment

Updated: 2024-08-02T05:17:50.108Z

cve-icon NVD

Status : Modified

Published: 2023-02-01T23:15:09.407

Modified: 2024-11-21T07:37:27.917

Link: CVE-2023-0599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses