CVE-2023-6710 – Mod_cluster/mod_proxy_cluster: stored cross site scripting
https://notcve.org/view.php?id=CVE-2023-6710
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. Se encontró una falla en mod_proxy_cluster en el servidor Apache. Este problema puede permitir que un usuario malintencionado agregue un script en el parámetro 'alias' de la URL para activar la vulnerabilidad de Cross-Site Scripting (XSS) Almacenado. • https://github.com/DedSec-47/Metasploit-Exploits-CVE-2023-6710 https://github.com/DedSec-47/CVE-2023-6710 https://access.redhat.com/errata/RHSA-2024:1316 https://access.redhat.com/errata/RHSA-2024:1317 https://access.redhat.com/errata/RHSA-2024:2387 https://access.redhat.com/security/cve/CVE-2023-6710 https://bugzilla.redhat.com/show_bug.cgi?id=2254128 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2016-4459 – mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute
https://notcve.org/view.php?id=CVE-2016-4459
Stack-based buffer overflow in native/mod_manager/node.c in mod_cluster 1.2.9. Desbordamiento de búfer basado en la pila en native/mod_manager/node.c en mod_cluster 1.2.9. It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. • http://rhn.redhat.com/errata/RHSA-2016-2054.html http://rhn.redhat.com/errata/RHSA-2016-2055.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.securityfocus.com/bid/93555 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://bugzilla.redhat.com/show_bug.cgi?id=1341583 https://access.redhat.com/security/cve/CVE-2016-4459 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-0298 – mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages
https://notcve.org/view.php?id=CVE-2015-0298
Cross-site scripting (XSS) vulnerability in the manager web interface in mod_cluster before 1.3.2.Alpha1 allows remote attackers to inject arbitrary web script or HTML via a crafted MCMP message. Vulnerabilidad de XSS en la interfaz de administración web en mod_cluster en versiones anteriores a 1.3.2.Alpha1, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un mensaje MCMP manipulado. A flaw was found in the way the mod_cluster manager processed certain MCMP messages. An attacker with access to the network from which MCMP messages are allowed to be sent could use this flaw to execute arbitrary JavaScript code in the mod_cluster manager web interface. • http://rhn.redhat.com/errata/RHSA-2015-1641.html http://rhn.redhat.com/errata/RHSA-2015-1642.html https://issues.jboss.org/browse/MODCLUSTER-453 https://access.redhat.com/security/cve/CVE-2015-0298 https://bugzilla.redhat.com/show_bug.cgi?id=1197769 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-1154 – mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list
https://notcve.org/view.php?id=CVE-2012-1154
mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when "ROOT" is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed on the root context via unspecified vectors. mod_cluster v1.0.10 antes de v1.0.10 CPO3 y v1.1.x antes de v1.1.4, como cuando se utiliza en JBoss Enterprise Application Platform v5.1.2, cuando se pone "ROOT" en excludedContexts, expone el contexto de root del servidor, lo que permite a atacantes remotos eludir las restricciones de acceso y obtener acceso a las aplicaciones instaladas en el contexto raíz a través de vectores no especificados. • http://rhn.redhat.com/errata/RHSA-2012-1010.html http://rhn.redhat.com/errata/RHSA-2012-1011.html http://rhn.redhat.com/errata/RHSA-2012-1012.html http://rhn.redhat.com/errata/RHSA-2012-1052.html http://rhn.redhat.com/errata/RHSA-2012-1053.html http://rhn.redhat.com/errata/RHSA-2012-1166.html http://secunia.com/advisories/49636 https://bugzilla.redhat.com/show_bug.cgi?id=802200 https://community.jboss.org/message/624018 https://issues.jboss.org/browse/MODCLUSTE • CWE-264: Permissions, Privileges, and Access Controls •