First published: Thu Dec 14 2023(Updated: )
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Roles. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <23.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6367 is considered moderate due to its stored cross-site scripting (XSS) nature.
To fix CVE-2023-6367, upgrade your WhatsUp Gold to version 2023.1 or later to mitigate the vulnerability.
WhatsUp Gold versions prior to 2023.1 are affected by CVE-2023-6367.
CVE-2023-6367 is a stored cross-site scripting (XSS) vulnerability.
Yes, if exploited, CVE-2023-6367 can allow an attacker to execute arbitrary scripts in the context of the user’s browser.