Miggo Logo

CVE-2024-27095:
Decidim cross-site scripting (XSS) in the admin panel

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.3183%
Published
7/10/2024
Updated
7/31/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
decidim-adminrubygems< 0.27.60.27.6
decidim-adminrubygems>= 0.28.0.rc1, < 0.28.10.28.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves XSS via manipulated blob IDs in admin panel forms. The patch notes for v0.27.6 explicitly mention a backport to 'Allow passing a blob object to AssetRouter::Storage,' suggesting this component was central to the fix. CWE-79 aligns with improper input neutralization during web page generation, which would occur if AssetRouter::Storage processed untrusted blob IDs without sanitization. The admin panel's reliance on this function to render blobs (e.g., SVG files with embedded scripts) would directly enable the described attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** **min p*n*l is su*j**t to pot*nti*l XSS *tt*** in **s* t** *tt**k*r m*n***s to mo*i*y som* r**or*s **in* uplo**** to t** s*rv*r. T** *tt**k*r is **l* to ***n** *.*. to `<sv* onlo**=*l*rt('XSS')>` i* t**y know *ow to *r**t t**s* r*qu

Reasoning

T** vuln*r**ility involv*s XSS vi* m*nipul*t** *lo* I*s in **min p*n*l *orms. T** p*t** not*s *or v*.**.* *xpli*itly m*ntion * ***kport to '*llow p*ssin* * *lo* o*j**t to `*ss*tRout*r::Stor***`,' su***stin* t*is *ompon*nt w*s **ntr*l to t** *ix. *W*-