CVE-2023-45757

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45757
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45757.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45757
Withdrawn
2024-09-03T04:41:28.255072Z
Published
2023-10-16T09:15:11Z
Modified
2024-09-03T04:34:45.612444Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page. An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page.

Solution (choose one of three): 1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2411 3. disable rpcz feature

References

Affected packages

Git / github.com/apache/brpc

Affected ranges

Type
GIT
Repo
https://github.com/apache/brpc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.9.5
0.9.6
0.9.6-rc01
0.9.6-rc02
0.9.6-rc03
0.9.7
0.9.7-rc01
0.9.7-rc02
0.9.7-rc03
0.9.8-rc01

1.*

1.0.0
1.0.0-rc01
1.0.0-rc02
1.1.0
1.3.0
1.6.0

v0.*

v0.9.0