We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
Reserved 2023-12-12 | Published 2023-12-12 | Updated 2024-11-24 | Assigner redhatImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
2023-12-12: | Reported to Red Hat. |
2023-12-12: | Made public. |
Red Hat would like to thank Mohamed Mounir Boudjema (Intervalle-Technologies) for reporting this issue.
access.redhat.com/errata/RHSA-2024:1316 (RHSA-2024:1316)
access.redhat.com/errata/RHSA-2024:1317 (RHSA-2024:1317)
access.redhat.com/errata/RHSA-2024:2387 (RHSA-2024:2387)
access.redhat.com/security/cve/CVE-2023-6710
bugzilla.redhat.com/show_bug.cgi?id=2254128 (RHBZ#2254128)
Support options