Описание
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
Отчет
The impact of this vulnerability is considered as Low, as the cluster_manager URL should not be exposed outside and is protected by user/password.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss Core Services | mod_proxy_cluster | Affected | ||
JBoss Core Services for RHEL 8 | jbcs-httpd24-mod_proxy_cluster | Fixed | RHSA-2024:1316 | 18.03.2024 |
JBoss Core Services on RHEL 7 | jbcs-httpd24-mod_proxy_cluster | Fixed | RHSA-2024:1316 | 18.03.2024 |
Red Hat Enterprise Linux 9 | mod_proxy_cluster | Fixed | RHSA-2024:2387 | 30.04.2024 |
Text-Only JBCS | jbcs-httpd24-mod_proxy_cluster | Fixed | RHSA-2024:1317 | 18.03.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
A flaw was found in the mod_proxy_cluster in the Apache server. This i ...
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low, as the cluster_manager URL should not be exposed outside and is protected by user/password.
ELSA-2024-2387: mod_jk and mod_proxy_cluster security update (MODERATE)
EPSS
5.4 Medium
CVSS3