Описание
Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to error or succeed in an Avo::BaseAction subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.
Ссылки
- Patch
- Patch
- Release Notes
- Release Notes
- ExploitVendor Advisory
- Patch
- Patch
- Release Notes
- Release Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.47.0 (исключая)Версия от 3.0.2 (включая) до 3.3.0 (исключая)
Одно из
cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:*
cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:*
cpe:2.3:a:avohq:avo:3.0.0:pre12:*:*:*:ruby:*:*
EPSS
Процентиль: 90%
0.0577
Низкий
6.5 Medium
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 6.5
github
около 2 лет назад
Cross-site scripting (XSS) in Action messages on Avo
EPSS
Процентиль: 90%
0.0577
Низкий
6.5 Medium
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79