6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
0.001 Low
EPSS
Percentile
19.9%
Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to error
or succeed
in an Avo::BaseAction
subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.
CPE | Name | Operator | Version |
---|---|---|---|
avo | eq | 2.5.2.pre.6 | |
avo | eq | 2.30.1 | |
avo | eq | 2.1.2.pre2 | |
avo | eq | 2.28.0 | |
avo | eq | 2.9.1.pre1 | |
avo | eq | 1.25.1 | |
avo | eq | 2.44.0 | |
avo | eq | 2.1.2.pre1 | |
avo | eq | 1.3.1 | |
avo | eq | 3.0.1.beta5 |
github.com/avo-hq/avo
github.com/avo-hq/avo/commit/51bb80b181cd8e31744bdc4e7f9b501c81172347
github.com/avo-hq/avo/commit/fc92a05a8556b1787c8694643286a1afa6a71258
github.com/avo-hq/avo/releases/tag/v2.47.0
github.com/avo-hq/avo/releases/tag/v3.3.0
github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh
github.com/rubysec/ruby-advisory-db/blob/master/gems/avo/CVE-2024-22411.yml
nvd.nist.gov/vuln/detail/CVE-2024-22411