First published: Tue Dec 12 2023(Updated: )
A flaw was found in the mod_proxy_cluster in the Apache server. A malicious user can add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting vulnerability. by adding a script on the alias parameter on the URL it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low as the cluster_manager URL should NOT be exposed outside and protected by user/password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Modcluster Mod Proxy Cluster | ||
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.