CVE-2024-22411

Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to `error` or `succeed` in an `Avo::BaseAction` subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:*
cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:*
cpe:2.3:a:avohq:avo:3.0.0:pre12:*:*:*:ruby:*:*

History

No history.

Information

Published : 2024-01-16 22:15

Updated : 2024-11-21 08:56


NVD link : CVE-2024-22411

Mitre link : CVE-2024-22411

CVE.ORG link : CVE-2024-22411


JSON object : View

Products Affected

avohq

  • avo
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')