CVE-2024-22411

Severity CVSS v4.0:
Pending analysis
Type:
CWE-79 Cross-Site Scripting (XSS)
Publication date:
16/01/2024
Last modified:
24/01/2024

Description

Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to `error` or `succeed` in an `Avo::BaseAction` subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:* 2.47.0 (excluding)
cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:* 3.0.2 (including) 3.3.0 (excluding)
cpe:2.3:a:avohq:avo:3.0.0:pre12:*:*:*:ruby:*:*