CVE-2024-22411
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
16/01/2024
Last modified:
24/01/2024
Description
Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to `error` or `succeed` in an `Avo::BaseAction` subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:* | 2.47.0 (excluding) | |
| cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:* | 3.0.2 (including) | 3.3.0 (excluding) |
| cpe:2.3:a:avohq:avo:3.0.0:pre12:*:*:*:ruby:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/avo-hq/avo/commit/51bb80b181cd8e31744bdc4e7f9b501c81172347
- https://github.com/avo-hq/avo/commit/fc92a05a8556b1787c8694643286a1afa6a71258
- https://github.com/avo-hq/avo/releases/tag/v2.47.0
- https://github.com/avo-hq/avo/releases/tag/v3.3.0
- https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh



