Cross-site scripting (XSS) in Action messages on Avo
Published: January 17, 2024
SECURITY IDENTIFIERS
- CVE: CVE-2024-22411 (NVD)
- GHSA: GHSA-g8vp-2v5p-9qfh
- Vendor Advisory: https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh
GEM
SEVERITY
CVSS v3.x: 6.5 (Medium)
PATCHED VERSIONS
>= 3.3.0
~> 2.47, >= 2.47
DESCRIPTION
Avo is a framework to create admin panels for Ruby on Rails apps.
In Avo 3 pre12 any HTML inside text that is passed to error or
succeed in an Avo::BaseAction subclass will be rendered directly
without sanitization in the toast/notification that appears in the
UI on Action completion. A malicious user could exploit this
vulnerability to trigger a cross site scripting attack on an
unsuspecting user.
This issue has been addressed in the 3.0.2 release of Avo. Users are advised to upgrade.
