First published: Tue Dec 12 2023(Updated: )
A flaw was found in the mod_proxy_cluster in the Apache server. A malicious user can add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting vulnerability. by adding a script on the alias parameter on the URL it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low as the cluster_manager URL should NOT be exposed outside and protected by user/password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat ModCluster | ||
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6710 is classified as high due to its potential for cross-site scripting attacks.
To fix CVE-2023-6710, you should update the mod_proxy_cluster module to the latest version provided by Apache.
CVE-2023-6710 affects users of the mod_proxy_cluster module in Apache, particularly those running it on Red Hat Enterprise Linux 9.0.
CVE-2023-6710 is a stored cross-site scripting (XSS) vulnerability that can allow an attacker to execute scripts in the context of another user's session.
Yes, CVE-2023-6710 can be easily exploited by a malicious user who knows how to manipulate the alias parameter in the URL.