Miggo Logo

CVE-2023-34103: avo vulnerable to Stored XSS (Cross Site Scripting) in html content based fields

7.3

CVSS Score
3.1

Basic Information

EPSS Score
0.65709%
Published
6/6/2023
Updated
6/25/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
avorubygems<= 2.33.22.33.3
avorubygems>= 3.0.0.pre1, <= 3.0.0.pre12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using unsafe ERB output tags (<%==) that bypass HTML escaping. The commit patching GHSA-5cr9-5jx3-2g39 explicitly replaces these with sanitized outputs using Rails' sanitize helper. The affected components handle user-controllable HTML content in alerts, field helpers, headings, and trix fields - all critical points where unsanitized HTML rendering would enable XSS. The trix field components are particularly significant as they're explicitly called out in the vulnerability description as the attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Som* *vo *i*l*s *r* vuln*r**l* to XSS w**n r*n**rin* *tml **s** *ont*nt. ### **t*ils *urin* t** *n*lysis o* t** w** *ppli**tion, * r*n**r** *i*l* w*s *is*ov*r** t**t *i* not *ilt*r JS / *TML t**s in * s*** w*y *n* **n ** **us** to *x**ut

Reasoning

T** vuln*r**ility st*ms *rom usin* uns*** *R* output t**s (<%==) t**t *yp*ss *TML *s**pin*. T** *ommit p*t**in* **S*-**r*-*jx*-**** *xpli*itly r*pl***s t**s* wit* s*nitiz** outputs usin* R*ils' `s*nitiz*` **lp*r. T** *****t** *ompon*nts **n*l* us*r-*
CVE-2023-34103: Avo Trix Field HTML Render XSS | Miggo