First published: Thu Dec 14 2023(Updated: )
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within a dashboard component. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <23.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6364 is classified as a medium severity stored cross-site scripting (XSS) vulnerability.
To mitigate CVE-2023-6364, upgrade to WhatsUp Gold version 2023.1 or later.
CVE-2023-6364 affects all WhatsUp Gold versions prior to 2023.1.
Yes, attackers can exploit CVE-2023-6364 remotely through maliciously crafted XSS payloads.
The impact of CVE-2023-6364 allows attackers to execute arbitrary scripts in the context of a victim user’s session.