Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-6710— Mod_cluster/mod_proxy_cluster: stored cross site scripting

CVSS 5.4 · Medium EPSS 1.07% · P78
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-6710

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Mod_cluster/mod_proxy_cluster: stored cross site scripting
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache httpd 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache httpd是美国阿帕奇(Apache)基金会的一款专为现代操作系统开发和维护的开源HTTP服务器。 Apache httpd 存在跨站脚本漏洞,该漏洞源于mod_proxy_cluster 中发现了一个缺陷,允许恶意用户在 URL 的alias参数中添加脚本,以触发跨站脚本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatJBoss Core Services for RHEL 8 0:1.3.20-3.el8jbcs ~ * cpe:/a:redhat:jboss_core_services:1::el8
Red HatJBoss Core Services on RHEL 7 0:1.3.20-3.el7jbcs ~ * cpe:/a:redhat:jboss_core_services:1::el8
Red HatRed Hat Enterprise Linux 9 0:1.3.20-1.el9_4 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatText-Only JBCS-cpe:/a:redhat:jboss_core_services:1
Red HatRed Hat JBoss Core Services-cpe:/a:redhat:jboss_core_services:1

II. Public POCs for CVE-2023-6710

#POC DescriptionSource LinkShenlong Link
1Welcome to the Metasploit Exploits Repository, your go-to resource for a comprehensive collection of cutting-edge exploits designed for penetration testing and ethical hacking. Developed and maintained by Mohamed Mounir Boudjema, this repository is crafted with a deep understanding of the evolving landscape of cybersecurity.https://github.com/DedSec-47/Metasploit-Exploits-CVE-2023-6710POC Details
2Explore the depths of CVE-2023-6710 with our comprehensive Proof of Concept (PoC). This CVE, identified as a potential security vulnerability, has been meticulously examined to demonstrate its impact and provide a hands-on understanding of the associated risks.https://github.com/DedSec-47/CVE-2023-6710POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-6710

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2023-12-12 · 4 CVEs total

CVE-2023-53797.5 HIGHUndertow: ajp request closes connection exceeding maxrequestsize
CVE-2023-57647.1 HIGHAnsible: template injection
CVE-2023-49586.1 MEDIUMStackrox: missing http security headers allows for clickjacking in web ui

IV. Related Vulnerabilities

V. Comments for CVE-2023-6710

No comments yet


Leave a comment