CVE-2023-6366
📋 TL;DR
This stored XSS vulnerability in WhatsUp Gold allows attackers to inject malicious JavaScript into the Alert Center. When users interact with the crafted payload, the attacker can execute arbitrary code in the victim's browser. All WhatsUp Gold users running versions before 2023.1 are affected.
💻 Affected Systems
- WhatsUp Gold
📦 What is this software?
Whatsup Gold by Progress
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full control of victim's WhatsUp Gold session, potentially leading to credential theft, data exfiltration, or complete system compromise through chained attacks.
Likely Case
Session hijacking, credential theft, or unauthorized actions performed within the victim's WhatsUp Gold context.
If Mitigated
Limited impact with proper input validation and output encoding, though stored XSS remains a persistent threat.
🎯 Exploit Status
Stored XSS typically requires some level of access to inject payloads, but exploitation is straightforward once payload is placed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2023.1 or later
Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2023
Restart Required: Yes
Instructions:
1. Download WhatsUp Gold 2023.1 or later from Progress website. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Restart WhatsUp Gold services.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input validation for Alert Center fields to reject suspicious content.
Content Security Policy
allImplement strict CSP headers to limit script execution sources.
🧯 If You Can't Patch
- Restrict access to WhatsUp Gold to trusted users only
- Implement web application firewall with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check WhatsUp Gold version in administration console; if version is below 2023.1, system is vulnerable.
Check Version:
Check via WhatsUp Gold web interface: Admin > About, or on server: wugadmin.exe --version (Windows) or ./wugadmin --version (Linux)
Verify Fix Applied:
Verify version is 2023.1 or higher and test Alert Center functionality with safe test payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual Alert Center entries with script tags or JavaScript patterns
- Multiple failed login attempts following Alert Center modifications
Network Indicators:
- Unexpected outbound connections from WhatsUp Gold server following user interaction with alerts
SIEM Query:
source="WhatsUpGold" AND (message="*<script>*" OR message="*javascript:*" OR message="*alert(*")