Privilege escalation via stored XSS using the file upload service to upload malicious content.
The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/04/18/2 | |
http://www.openwall.com/lists/oss-security/2023/04/18/2 | |
https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt | Mailing List Vendor Advisory |
https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt | Mailing List Vendor Advisory |
Configurations
History
13 Feb 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/04/18/2 - | |
References | () https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt - Mailing List, Vendor Advisory | |
CWE | ||
Summary | Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user. |
18 Apr 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user. |
05 Apr 2023, 02:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:* | |
First Time |
Apache archiva
Apache |
Information
Published : 2023-03-29 13:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-28158
Mitre link : CVE-2023-28158
JSON object : View
Products Affected
apache
- archiva
CWE
No CWE.