Skip to content

Possible XSS in Action messages

Moderate
adrianthedev published GHSA-g8vp-2v5p-9qfh Jan 16, 2024

Package

bundler avo (RubyGems)

Affected versions

3.0.0.pre12

Patched versions

3.0.0

Description

Summary

I have noticed in my usage of Avo 3 pre12 that any HTML inside text that is passed to error or succeed in a Avo::BaseAction subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion.

PoC

Disable CSP then add the following action to some Resource:

class Avo::Actions::MyAction < Avo::BaseAction
  self.name = "An action"

  def handle(**args)
    error "<em>oh no</em><script>alert('boo')</script>"
  end
end

image

Impact

What kind of vulnerability is it? Who is impacted?

Note

This is the first time I use this advisories system to report something, hope its ok!

Severity

Moderate

CVE ID

CVE-2024-22411

Weaknesses

Credits