Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 919880 (CVE-2023-6710) - www-servers/apache: XSS in mod_proxy_cluster
Summary: www-servers/apache: XSS in mod_proxy_cluster
Status: RESOLVED INVALID
Alias: CVE-2023-6710
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-14 14:26 UTC by Christopher Fore
Modified: 2023-12-23 07:42 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2023-12-14 14:26:57 UTC
CVE-2023-6710 (https://access.redhat.com/security/cve/CVE-2023-6710):

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low, as the cluster_manager URL should not be exposed outside and is protected by user/password.


No published info from upstream, just a CVE from RedHat.
Comment 1 Hans de Graaff gentoo-dev Security 2023-12-23 07:42:02 UTC
mod_proxy_cluster is a separate module that is distributed independent of the Apache httpd server and not packaged in Gentoo.

https://github.com/modcluster/mod_proxy_cluster