First published: Mon Oct 16 2023(Updated: )
Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page. An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page. Solution (choose one of three): 1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2411 3. disable rpcz feature
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache bRPC | <1.6.1 | |
<1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45757 is a security vulnerability in Apache bRPC <=1.6.0 that allows attackers to inject XSS code to the builtin rpcz page.
The severity of CVE-2023-45757 is medium with a CVSS severity score of 6.1.
CVE-2023-45757 affects Apache bRPC <=1.6.0 on all platforms.
An attacker that can send HTTP requests to a bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page.
To fix CVE-2023-45757, upgrade Apache bRPC to version 1.6.1 or later.