Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-6710Cross-site Scripting in Redhat Enterprise Linux

Severity
5.4MEDIUMNVD
EPSS
1.1%
top 22.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 12
Latest updateMay 13

Description

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages0 packages

Also affects: Enterprise Linux 9.0

🔴Vulnerability Details

2
GHSA
GHSA-5xpv-wgx6-ggmv: A flaw was found in the mod_proxy_cluster in the Apache server2023-12-13
CVEList
Mod_cluster/mod_proxy_cluster: stored cross site scripting2023-12-12

💥Exploits & PoCs

1
Exploit-DB
Apache mod_proxy_cluster 1.2.6 - Stored XSS2024-05-13

📋Vendor Advisories

1
Red Hat
mod_cluster/mod_proxy_cluster: Stored Cross site Scripting2023-12-12
CVE-2023-6710 — Cross-site Scripting in Redhat | cvebase