CVE-2024-32887: Sidekiq vulnerable to a Reflected XSS in Queues Web Page
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.43012%
CWE
Published
4/26/2024
Updated
5/1/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
sidekiq | rubygems | >= 7.2.0, < 7.2.4 | 7.2.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows the fix added HTML escaping (h(params[:substr])) to the metrics.erb template. The original unescaped <%= params[:substr] %> in the input's value attribute created an XSS vector. ERB templates without proper output encoding are a well-known XSS risk pattern. The direct parameter reflection in a UI component with demonstrated exploitability confirms this as the vulnerable code path.