Miggo Logo

CVE-2024-32887: Sidekiq vulnerable to a Reflected XSS in Queues Web Page

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.43012%
Published
4/26/2024
Updated
5/1/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
sidekiqrubygems>= 7.2.0, < 7.2.47.2.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows the fix added HTML escaping (h(params[:substr])) to the metrics.erb template. The original unescaped <%= params[:substr] %> in the input's value attribute created an XSS vector. ERB templates without proper output encoding are a well-known XSS risk pattern. The direct parameter reflection in a UI component with demonstrated exploitability confirms this as the vulnerable code path.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription: *urin* t** sour** *o** R*vi*w o* t** m*tri*s.*r* vi*w o* t** Si**kiq W** UI, * r**l**t** XSS vuln*r**ility is *is*ov*r**. T** v*lu* o* su*str p*r*m*t*r is r**l**t** in t** r*spons* wit*out *ny *n*o*in*, *llowin* *n *tt**k*r to inj**t

Reasoning

T** *ommit *i** s*ows t** *ix ***** *TML *s**pin* (*(p*r*ms[:su*str])) to t** m*tri*s.*r* t*mpl*t*. T** ori*in*l un*s**p** <%= p*r*ms[:su*str] %> in t** input's v*lu* *ttri*ut* *r**t** *n XSS v**tor. *R* t*mpl*t*s wit*out prop*r output *n*o*in* *r* *