Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page.
An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page.
Solution (choose one of three):
1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/
2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2411
3. disable rpcz feature
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/10/16/8 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 | Mailing List Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: apache
Published: 2023-10-16T08:01:41.036Z
Updated: 2023-10-16T08:01:41.036Z
Reserved: 2023-10-12T09:28:16.458Z
Link: CVE-2023-45757
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-16T09:15:11.563
Modified: 2023-10-19T18:21:01.680
Link: CVE-2023-45757
JSON object: View
Redhat Information
No data.
CWE