Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page. An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page. Solution (choose one of three): 1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2411 3. disable rpcz feature
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/10/16/8 Mailing List Third Party Advisory
https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 Mailing List Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: apache

Published: 2023-10-16T08:01:41.036Z

Updated: 2023-10-16T08:01:41.036Z

Reserved: 2023-10-12T09:28:16.458Z


Link: CVE-2023-45757

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-10-16T09:15:11.563

Modified: 2023-10-19T18:21:01.680


Link: CVE-2023-45757

JSON object: View

cve-icon Redhat Information

No data.

CWE