CVE-2023-34103: avo vulnerable to Stored XSS (Cross Site Scripting) in html content based fields
7.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65709%
CWE
Published
6/6/2023
Updated
6/25/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| avo | rubygems | <= 2.33.2 | 2.33.3 |
| avo | rubygems | >= 3.0.0.pre1, <= 3.0.0.pre12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using unsafe ERB output tags (<%==) that bypass HTML escaping. The commit patching GHSA-5cr9-5jx3-2g39 explicitly replaces these with sanitized outputs using Rails' sanitize helper. The affected components handle user-controllable HTML content in alerts, field helpers, headings, and trix fields - all critical points where unsanitized HTML rendering would enable XSS. The trix field components are particularly significant as they're explicitly called out in the vulnerability description as the attack vector.