Логотип exploitDog
bind:CVE-2024-32887
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-32887

Количество 6

Количество 6

ubuntu логотип

CVE-2024-32887

почти 2 года назад

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-32887

почти 2 года назад

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-32887

почти 2 года назад

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-32887

почти 2 года назад

Sidekiq is simple, efficient background processing for Ruby. Sidekiq i ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-q655-3pj8-9fxq

почти 2 года назад

Sidekiq vulnerable to a Reflected XSS in Queues Web Page

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2024-05712

почти 2 года назад

Уязвимость фреймворка для обработки фоновых задач в веб-приложениях Sidekiq, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-32887

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-32887

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-32887

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
debian логотип
CVE-2024-32887

Sidekiq is simple, efficient background processing for Ruby. Sidekiq i ...

CVSS3: 5.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-q655-3pj8-9fxq

Sidekiq vulnerable to a Reflected XSS in Queues Web Page

CVSS3: 5.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-05712

Уязвимость фреймворка для обработки фоновых задач в веб-приложениях Sidekiq, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 5.5
0%
Низкий
почти 2 года назад

Уязвимостей на страницу