Skip to content

Cross-site scripting (XSS) in Action messages on Avo

Moderate severity GitHub Reviewed Published Jan 16, 2024 in avo-hq/avo • Updated Jan 19, 2024

Package

bundler avo (RubyGems)

Affected versions

>= 3.0.0.beta1, < 3.3.0
< 2.47.0

Patched versions

3.3.0
2.47.0

Description

Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to error or succeed in an Avo::BaseAction subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.

References

@adrianthedev adrianthedev published to avo-hq/avo Jan 16, 2024
Published by the National Vulnerability Database Jan 16, 2024
Published to the GitHub Advisory Database Jan 17, 2024
Reviewed Jan 17, 2024
Last updated Jan 19, 2024

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

Weaknesses

CVE ID

CVE-2024-22411

GHSA ID

GHSA-g8vp-2v5p-9qfh

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.