1 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 2

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. Se encontró una falla en mod_proxy_cluster en el servidor Apache. Este problema puede permitir que un usuario malintencionado agregue un script en el parámetro 'alias' de la URL para activar la vulnerabilidad de Cross-Site Scripting (XSS) Almacenado. • https://github.com/DedSec-47/Metasploit-Exploits-CVE-2023-6710 https://github.com/DedSec-47/CVE-2023-6710 https://access.redhat.com/errata/RHSA-2024:1316 https://access.redhat.com/errata/RHSA-2024:1317 https://access.redhat.com/errata/RHSA-2024:2387 https://access.redhat.com/security/cve/CVE-2023-6710 https://bugzilla.redhat.com/show_bug.cgi?id=2254128 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •