Lucene search

K
cveGitHub_MCVE-2023-34102
HistoryJun 05, 2023 - 11:15 p.m.

CVE-2023-34102

2023-06-0523:15:12
CWE-470
CWE-20
GitHub_M
web.nvd.nist.gov
25
avo
ruby on rails
admin panel
framework
vulnerability
cve-2023-34102
security
nvd

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

62.3%

Avo is an open source ruby on rails admin panel creation framework. The polymorphic field type stores the classes to operate on when updating a record with user input, and does not validate them in the back end. This can lead to unexpected behavior, remote code execution, or application crashes when viewing a manipulated record. This issue has been addressed in commit ec117882d which is expected to be included in subsequent releases. Users are advised to limit access to untrusted users until a new release is made.

Affected configurations

Nvd
Vulners
Node
avohqavoRange2.33.2ruby
OR
avohqavoMatch3.0.0pre12ruby
VendorProductVersionCPE
avohqavo*cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:*
avohqavo3.0.0cpe:2.3:a:avohq:avo:3.0.0:pre12:*:*:*:ruby:*:*

CNA Affected

[
  {
    "vendor": "avo-hq",
    "product": "avo",
    "versions": [
      {
        "version": "<= 2.33.2",
        "status": "affected"
      },
      {
        "version": ">= 3.0.0.pre1, <= 3.0.0.pre12",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

62.3%