Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://docs.rapid7.com/release-notes/metasploit/20230130/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-02T05:17:50.108Z
Reserved: 2023-01-31T17:28:37.548Z
Link: CVE-2023-0599

No data.

Status : Modified
Published: 2023-02-01T23:15:09.407
Modified: 2024-11-21T07:37:27.917
Link: CVE-2023-0599

No data.