CVE-2024-48652: camaleon_cms affected by cross site scripting
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88729%
CWE
Published
10/23/2024
Updated
10/24/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| camaleon_cms | rubygems | <= 2.7.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the content group name field handling. In Rails applications, XSS typically occurs either during input sanitization (controller/model level) or output escaping (view level). The reproduction steps indicate stored XSS, requiring both: 1) insufficient input validation when saving the name field (controller/model), and 2) unsafe rendering in views. While exact code isn't available, the admin content group editing flow would logically involve these components. The high confidence in view rendering stems from Rails' default unsafe output behavior when using <%= %> without escaping.