Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-45757", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2023-10-12T09:28:16.458Z", "datePublished": "2023-10-16T08:01:41.036Z", "dateUpdated": "2025-02-13T17:14:10.463Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Apache bRPC", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "1.6.0", "status": "affected", "version": "0.9.0", "versionType": "semver"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">Security vulnerability </span>in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page.<br>An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page.<br><br>Solution<span style=\"background-color: rgba(0, 0, 0, 0.2);\"> (choose one of three)</span>:<br>1. upgrade to bRPC > 1.6.0, download link: <a target=\"_blank\" rel=\"nofollow\" href=\"https://dist.apache.org/repos/dist/release/brpc/1.6.1/\">https://dist.apache.org/repos/dist/release/brpc/1.6.1/</a><br>2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: <a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/apache/brpc/pull/2411\">https://github.com/apache/brpc/pull/2411</a><br>3. disable rpcz feature"}], "value": "Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page.\nAn attacker that can send http request to bRPC server with rpcz enabled can\u00a0inject arbitrary XSS code to the builtin rpcz page.\n\nSolution\u00a0(choose one of three):\n1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ \n2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:\u00a0 https://github.com/apache/brpc/pull/2411 \n3. disable rpcz feature"}], "metrics": [{"other": {"content": {"text": "important"}, "type": "Textual description of severity"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2023-10-16T08:05:04.599Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4"}, {"url": "http://www.openwall.com/lists/oss-security/2023/10/16/8"}], "source": {"discovery": "EXTERNAL"}, "title": "Apache bRPC: The builtin service rpcz page has an XSS attack vulnerability", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T20:29:32.439Z"}, "title": "CVE Program Container", "references": [{"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4"}, {"url": "http://www.openwall.com/lists/oss-security/2023/10/16/8", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-16T18:27:21.148995Z", "id": "CVE-2023-45757", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-16T18:27:28.347Z"}}]}}