Lucene search

K
redhatcveRedhat.comRH:CVE-2023-50727
HistoryDec 26, 2023 - 7:30 a.m.

CVE-2023-50727

2023-12-2607:30:24
redhat.com
access.redhat.com
9
cve-2023-50727
resque
cross-site scripting
remote attackers
authentication credentials

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

A cross-site scripting flaw was found in Resque due to improper validation of user-supplied input by the Queue Endpoint. This issue could allow a remote authenticated attacker to use a specially crafted URL to execute script in a victim’s web browser within the security context of the hosting web site once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

Related for RH:CVE-2023-50727