First published: Tue Dec 12 2023(Updated: )
A flaw was found in the mod_proxy_cluster in the Apache server. A malicious user can add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting vulnerability. by adding a script on the alias parameter on the URL it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low as the cluster_manager URL should NOT be exposed outside and protected by user/password.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache mod_proxy_cluster |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability described in REDHAT-BUG-2254128 is a stored cross-site scripting (XSS) vulnerability in the Apache mod_proxy_cluster.
To mitigate REDHAT-BUG-2254128, it is recommended to update the Apache mod_proxy_cluster to the latest patched version.
REDHAT-BUG-2254128 affects systems running the Apache mod_proxy_cluster module.
The potential impacts of REDHAT-BUG-2254128 include unauthorized script execution and data theft through cross-site scripting attacks.
REDHAT-BUG-2254128 can be exploited by a malicious user who manipulates the 'alias' parameter in the URL to inject a script.