Skip to main content

CVE-2023-6366: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Progress Software Corporation WhatsUp Gold

High
VulnerabilityCVE-2023-6366cvecve-2023-6366cwe-79
Published: Thu Dec 14 2023 (12/14/2023, 16:05:31 UTC)
Source: CVE
Vendor/Project: Progress Software Corporation
Product: WhatsUp Gold

Description

In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:25:37 UTC

Technical Analysis

CVE-2023-6366 is a high-severity stored cross-site scripting (XSS) vulnerability affecting Progress Software Corporation's WhatsUp Gold product, specifically versions 2022.0 and 2023.0 released before 2023.1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript payloads that are stored within the Alert Center component of WhatsUp Gold. When a legitimate user interacts with the crafted payload, the malicious script executes in the context of the victim's browser session. This can lead to a range of malicious outcomes including session hijacking, credential theft, unauthorized actions on behalf of the user, and potential pivoting within the network. The CVSS v3.1 base score is 7.6, reflecting high severity, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be targeted by attackers. The lack of a patch link suggests that users should monitor vendor advisories closely for updates or mitigations. Given WhatsUp Gold's role as a network monitoring and management tool, exploitation could compromise monitoring data integrity and availability, potentially blinding network administrators to ongoing attacks or failures.

Potential Impact

For European organizations, the impact of CVE-2023-6366 can be significant due to WhatsUp Gold's widespread use in enterprise network monitoring and management. Successful exploitation could allow attackers to execute arbitrary scripts in the browsers of network administrators or operators, leading to theft of credentials, session tokens, or manipulation of monitoring data. This could result in unauthorized access to sensitive network infrastructure, disruption of network visibility, and delayed incident response. Given the critical nature of network monitoring in sectors such as finance, healthcare, energy, and government, the vulnerability could facilitate lateral movement by attackers and increase the risk of data breaches or operational disruptions. Additionally, the cross-site scripting nature means that social engineering or phishing techniques could be combined with this vulnerability to increase attack success. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments where multiple administrators have access to WhatsUp Gold consoles.

Mitigation Recommendations

European organizations should immediately review their WhatsUp Gold deployments and verify the version in use. Upgrading to version 2023.1 or later, once available, is the most effective mitigation. Until patches are released, organizations should implement strict input validation and output encoding on the Alert Center inputs if customization is possible. Restrict access to the WhatsUp Gold management console to trusted administrators only, enforce the principle of least privilege, and use network segmentation to limit exposure. Employ Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the execution of unauthorized scripts. Additionally, educate administrators about the risks of interacting with unexpected or suspicious alerts within the Alert Center. Monitor logs for unusual activity and consider deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to WhatsUp Gold. Finally, maintain a robust incident response plan to quickly address any suspected exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2023-11-28T15:36:12.163Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682de8d1c4522896dcc00435

Added to database: 5/21/2025, 2:53:05 PM

Last enriched: 7/7/2025, 3:25:37 PM

Last updated: 8/16/2025, 8:53:24 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats