CVE-2024-22411

CVSS 3.1 Score 5.4 of 10 (medium)

Details

Published Jan 16, 2024
Updated: Jan 24, 2024
CWE ID 79

Summary

CVE-2024-22411 is a vulnerability that affects Avo, a framework for creating admin panels for Ruby on Rails apps. In Avo 3 pre12, there is a vulnerability where any HTML inside text passed to `error` or `succeed` in an `Avo::BaseAction` subclass will be rendered without sanitization in the toast/notification that appears in the UI on action completion. This vulnerability could be exploited by a malicious user to trigger a cross-site scripting attack on an unsuspecting user. The issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo, and users are advised to upgrade their software to mitigate the risk. The vulnerability has a base severity of MEDIUM and requires low privileges and user interaction to exploit.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-22411 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions