Lucene search

K
redhatcveRedhat.comRH:CVE-2023-50725
HistoryDec 26, 2023 - 7:30 a.m.

CVE-2023-50725

2023-12-2607:30:30
redhat.com
access.redhat.com
8
cve-2023-50725
cross-site scripting
validation
user-supplied input
resque
remote attacker
specially crafted url
script execution
web browser
security context
hosting website
cookie-based authentication

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

A cross-site scripting flaw was found in Resque due to improper validation of user-supplied input by the resque-web failed and queues lists. This issue could allow a remote authenticated attacker to use a specially crafted URL to execute script in a victim’s web browser within the security context of the hosting website once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

Related for RH:CVE-2023-50725