Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page.
An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page.
Solution (choose one of three):
1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/
2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2411
3. disable rpcz feature
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/10/16/8 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/10/16/8 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 | Mailing List Vendor Advisory |
Configurations
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-16 09:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-45757
Mitre link : CVE-2023-45757
CVE.ORG link : CVE-2023-45757
JSON object : View
Products Affected
apache
- brpc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')