{"id":"CVE-2023-6710","details":"A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.","modified":"2026-03-15T22:49:01.037968Z","published":"2023-12-12T22:15:22.950Z","related":["ALSA-2024:2387"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1316"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1317"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2387"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-6710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254128"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-6710.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}