CVE-2023-6366: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Progress Software Corporation WhatsUp Gold
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
AI Analysis
Technical Summary
CVE-2023-6366 is a high-severity stored cross-site scripting (XSS) vulnerability affecting Progress Software Corporation's WhatsUp Gold product, specifically versions 2022.0 and 2023.0 released before 2023.1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript payloads that are stored within the Alert Center component of WhatsUp Gold. When a legitimate user interacts with the crafted payload, the malicious script executes in the context of the victim's browser session. This can lead to a range of malicious outcomes including session hijacking, credential theft, unauthorized actions on behalf of the user, and potential pivoting within the network. The CVSS v3.1 base score is 7.6, reflecting high severity, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be targeted by attackers. The lack of a patch link suggests that users should monitor vendor advisories closely for updates or mitigations. Given WhatsUp Gold's role as a network monitoring and management tool, exploitation could compromise monitoring data integrity and availability, potentially blinding network administrators to ongoing attacks or failures.
Potential Impact
For European organizations, the impact of CVE-2023-6366 can be significant due to WhatsUp Gold's widespread use in enterprise network monitoring and management. Successful exploitation could allow attackers to execute arbitrary scripts in the browsers of network administrators or operators, leading to theft of credentials, session tokens, or manipulation of monitoring data. This could result in unauthorized access to sensitive network infrastructure, disruption of network visibility, and delayed incident response. Given the critical nature of network monitoring in sectors such as finance, healthcare, energy, and government, the vulnerability could facilitate lateral movement by attackers and increase the risk of data breaches or operational disruptions. Additionally, the cross-site scripting nature means that social engineering or phishing techniques could be combined with this vulnerability to increase attack success. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments where multiple administrators have access to WhatsUp Gold consoles.
Mitigation Recommendations
European organizations should immediately review their WhatsUp Gold deployments and verify the version in use. Upgrading to version 2023.1 or later, once available, is the most effective mitigation. Until patches are released, organizations should implement strict input validation and output encoding on the Alert Center inputs if customization is possible. Restrict access to the WhatsUp Gold management console to trusted administrators only, enforce the principle of least privilege, and use network segmentation to limit exposure. Employ Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the execution of unauthorized scripts. Additionally, educate administrators about the risks of interacting with unexpected or suspicious alerts within the Alert Center. Monitor logs for unusual activity and consider deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to WhatsUp Gold. Finally, maintain a robust incident response plan to quickly address any suspected exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2023-6366: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Progress Software Corporation WhatsUp Gold
Description
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
AI-Powered Analysis
Technical Analysis
CVE-2023-6366 is a high-severity stored cross-site scripting (XSS) vulnerability affecting Progress Software Corporation's WhatsUp Gold product, specifically versions 2022.0 and 2023.0 released before 2023.1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript payloads that are stored within the Alert Center component of WhatsUp Gold. When a legitimate user interacts with the crafted payload, the malicious script executes in the context of the victim's browser session. This can lead to a range of malicious outcomes including session hijacking, credential theft, unauthorized actions on behalf of the user, and potential pivoting within the network. The CVSS v3.1 base score is 7.6, reflecting high severity, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be targeted by attackers. The lack of a patch link suggests that users should monitor vendor advisories closely for updates or mitigations. Given WhatsUp Gold's role as a network monitoring and management tool, exploitation could compromise monitoring data integrity and availability, potentially blinding network administrators to ongoing attacks or failures.
Potential Impact
For European organizations, the impact of CVE-2023-6366 can be significant due to WhatsUp Gold's widespread use in enterprise network monitoring and management. Successful exploitation could allow attackers to execute arbitrary scripts in the browsers of network administrators or operators, leading to theft of credentials, session tokens, or manipulation of monitoring data. This could result in unauthorized access to sensitive network infrastructure, disruption of network visibility, and delayed incident response. Given the critical nature of network monitoring in sectors such as finance, healthcare, energy, and government, the vulnerability could facilitate lateral movement by attackers and increase the risk of data breaches or operational disruptions. Additionally, the cross-site scripting nature means that social engineering or phishing techniques could be combined with this vulnerability to increase attack success. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments where multiple administrators have access to WhatsUp Gold consoles.
Mitigation Recommendations
European organizations should immediately review their WhatsUp Gold deployments and verify the version in use. Upgrading to version 2023.1 or later, once available, is the most effective mitigation. Until patches are released, organizations should implement strict input validation and output encoding on the Alert Center inputs if customization is possible. Restrict access to the WhatsUp Gold management console to trusted administrators only, enforce the principle of least privilege, and use network segmentation to limit exposure. Employ Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the execution of unauthorized scripts. Additionally, educate administrators about the risks of interacting with unexpected or suspicious alerts within the Alert Center. Monitor logs for unusual activity and consider deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to WhatsUp Gold. Finally, maintain a robust incident response plan to quickly address any suspected exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2023-11-28T15:36:12.163Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682de8d1c4522896dcc00435
Added to database: 5/21/2025, 2:53:05 PM
Last enriched: 7/7/2025, 3:25:37 PM
Last updated: 8/16/2025, 8:53:24 PM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.