{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-6710","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2023-12-12T06:15:58.379Z","datePublished":"2023-12-12T22:01:34.359Z","dateUpdated":"2025-11-20T01:24:59.033Z"},"containers":{"cna":{"title":"Mod_cluster/mod_proxy_cluster: stored cross site scripting","metrics":[{"other":{"content":{"value":"Low","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page."}],"affected":[{"vendor":"Red Hat","product":"JBoss Core Services for RHEL 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"jbcs-httpd24-mod_proxy_cluster","defaultStatus":"affected","versions":[{"version":"0:1.3.20-3.el8jbcs","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:jboss_core_services:1::el8","cpe:/a:redhat:jboss_core_services:1::el7"]},{"vendor":"Red Hat","product":"JBoss Core Services on RHEL 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"jbcs-httpd24-mod_proxy_cluster","defaultStatus":"affected","versions":[{"version":"0:1.3.20-3.el7jbcs","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:jboss_core_services:1::el8","cpe:/a:redhat:jboss_core_services:1::el7"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"mod_proxy_cluster","defaultStatus":"affected","versions":[{"version":"0:1.3.20-1.el9_4","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:enterprise_linux:9::appstream"]},{"vendor":"Red Hat","product":"Text-Only JBCS","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","defaultStatus":"unaffected","packageName":"jbcs-httpd24-mod_proxy_cluster","cpes":["cpe:/a:redhat:jboss_core_services:1"]},{"vendor":"Red Hat","product":"Red Hat JBoss Core Services","collectionURL":"https://access.redhat.com/jbossnetwork/restricted/listSoftware.html","packageName":"mod_proxy_cluster","defaultStatus":"affected","cpes":["cpe:/a:redhat:jboss_core_services:1"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:1316","name":"RHSA-2024:1316","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:1317","name":"RHSA-2024:1317","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:2387","name":"RHSA-2024:2387","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-6710","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254128","name":"RHBZ#2254128","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2023-12-12T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}],"timeline":[{"lang":"en","time":"2023-12-12T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-12-12T00:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Mohamed Mounir Boudjema (Intervalle-Technologies) for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-11-20T01:24:59.033Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:14.928Z"},"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/errata/RHSA-2024:1316","name":"RHSA-2024:1316","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"]},{"url":"https://access.redhat.com/errata/RHSA-2024:1317","name":"RHSA-2024:1317","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"]},{"url":"https://access.redhat.com/errata/RHSA-2024:2387","name":"RHSA-2024:2387","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-6710","tags":["vdb-entry","x_refsource_REDHAT","x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254128","name":"RHBZ#2254128","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"]}]}]}}