First published: Thu Dec 14 2023(Updated: )
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <23.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6366 is assessed as a significant vulnerability due to its potential for stored cross-site scripting attacks.
To mitigate CVE-2023-6366, upgrade to WhatsUp Gold version 2023.1 or later.
CVE-2023-6366 can enable attackers to execute malicious scripts in the context of an affected user's web session.
Users of WhatsUp Gold versions prior to 2023.1 are affected by CVE-2023-6366.
Stored cross-site scripting in CVE-2023-6366 refers to the ability of an attacker to store a malicious script within the Alert Center that can be executed by other users.