CVE-2023-45757

Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page. An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page. Solution (choose one of three): 1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2411 3. disable rpcz feature
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/10/16/8 Mailing List Third Party Advisory
https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 Mailing List Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:brpc:*:*:*:*:*:*:*:*

History

19 Oct 2023, 18:21

Type Values Removed Values Added
References (MISC) https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 - (MISC) https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 - Mailing List, Vendor Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2023/10/16/8 - (MISC) http://www.openwall.com/lists/oss-security/2023/10/16/8 - Mailing List, Third Party Advisory
First Time Apache
Apache brpc
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:apache:brpc:*:*:*:*:*:*:*:*

16 Oct 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/10/16/8 -

16 Oct 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-16 09:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-45757

Mitre link : CVE-2023-45757

CVE.ORG link : CVE-2023-45757


JSON object : View

Products Affected

apache

  • brpc
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')