Lucene search

K
cvelistRedhatCVELIST:CVE-2023-6710
HistoryDec 12, 2023 - 10:01 p.m.

CVE-2023-6710 Mod_cluster/mod_proxy_cluster: stored cross site scripting

2023-12-1222:01:34
CWE-79
redhat
www.cve.org
1
cve-2023-6710
mod_cluster
stored cross-site scripting

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.2%

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the ‘alias’ parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "JBoss Core Services for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "jbcs-httpd24-mod_proxy_cluster",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.3.20-3.el8jbcs",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:jboss_core_services:1::el7",
      "cpe:/a:redhat:jboss_core_services:1::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "JBoss Core Services on RHEL 7",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "jbcs-httpd24-mod_proxy_cluster",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.3.20-3.el7jbcs",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:jboss_core_services:1::el7",
      "cpe:/a:redhat:jboss_core_services:1::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 9",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "mod_proxy_cluster",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.3.20-1.el9_4",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:enterprise_linux:9::appstream"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Core Services 1",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "unaffected",
    "packageName": "jbcs-httpd24-mod_proxy_cluster",
    "cpes": [
      "cpe:/a:redhat:jboss_core_services:1"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat JBoss Core Services",
    "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
    "packageName": "mod_proxy_cluster",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:jboss_core_services:1"
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.2%