CVE-2024-32887 (GCVE-0-2024-32887)
Vulnerability from cvelistv5 – Published: 2024-04-26 21:02 – Updated: 2024-08-02 02:20
VLAI?
Summary
Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.
Severity ?
5.5 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:sidekiq:sidekiq:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sidekiq",
"vendor": "sidekiq",
"versions": [
{
"status": "affected",
"version": "7.2.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32887",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T11:33:23.758613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:06.961Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:20:35.661Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq"
},
{
"name": "https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d"
},
{
"name": "https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "sidekiq",
"vendor": "sidekiq",
"versions": [
{
"status": "affected",
"version": "\u003e= 7.2.0, \u003c 7.2.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-26T21:02:42.462Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq"
},
{
"name": "https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d"
},
{
"name": "https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4"
}
],
"source": {
"advisory": "GHSA-q655-3pj8-9fxq",
"discovery": "UNKNOWN"
},
"title": "Reflected XSS in sidekiq"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-32887",
"datePublished": "2024-04-26T21:02:42.462Z",
"dateReserved": "2024-04-19T14:07:11.231Z",
"dateUpdated": "2024-08-02T02:20:35.661Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Sidekiq es un procesamiento en segundo plano simple y eficiente para Ruby. Sidekiq refleja la vulnerabilidad XSS. El valor del par\\u00e1metro substr se refleja en la respuesta sin ninguna codificaci\\u00f3n, lo que permite a un atacante inyectar c\\u00f3digo Javascript en la respuesta de la aplicaci\\u00f3n. Un atacante podr\\u00eda aprovecharlo para atacar a los usuarios de la interfaz de usuario web de Sidekiq. Adem\\u00e1s, si se implementan otras aplicaciones en el mismo dominio o sitio web que Sidekiq, los usuarios de esas aplicaciones tambi\\u00e9n podr\\u00edan verse afectados, lo que generar\\u00eda un alcance m\\u00e1s amplio de compromiso. Potencialmente comprometer sus cuentas, obligar a los usuarios a realizar acciones confidenciales, robar datos confidenciales, realizar ataques CORS, desfigurar la aplicaci\\u00f3n web, etc. Este problema se solucion\\u00f3 en la versi\\u00f3n 7.2.4.\"}]",
"id": "CVE-2024-32887",
"lastModified": "2024-11-21T09:15:56.457",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.1, \"impactScore\": 3.4}]}",
"published": "2024-04-26T21:15:49.820",
"references": "[{\"url\": \"https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-32887\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-04-26T21:15:49.820\",\"lastModified\":\"2024-11-21T09:15:56.457\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Sidekiq es un procesamiento en segundo plano simple y eficiente para Ruby. Sidekiq refleja la vulnerabilidad XSS. El valor del par\u00e1metro substr se refleja en la respuesta sin ninguna codificaci\u00f3n, lo que permite a un atacante inyectar c\u00f3digo Javascript en la respuesta de la aplicaci\u00f3n. Un atacante podr\u00eda aprovecharlo para atacar a los usuarios de la interfaz de usuario web de Sidekiq. Adem\u00e1s, si se implementan otras aplicaciones en el mismo dominio o sitio web que Sidekiq, los usuarios de esas aplicaciones tambi\u00e9n podr\u00edan verse afectados, lo que generar\u00eda un alcance m\u00e1s amplio de compromiso. Potencialmente comprometer sus cuentas, obligar a los usuarios a realizar acciones confidenciales, robar datos confidenciales, realizar ataques CORS, desfigurar la aplicaci\u00f3n web, etc. Este problema se solucion\u00f3 en la versi\u00f3n 7.2.4.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.1,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Reflected XSS in sidekiq\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-79\", \"lang\": \"en\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"LOW\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq\"}, {\"name\": \"https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d\"}, {\"name\": \"https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4\"}], \"affected\": [{\"vendor\": \"sidekiq\", \"product\": \"sidekiq\", \"versions\": [{\"version\": \"\u003e= 7.2.0, \u003c 7.2.4\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-04-26T21:02:42.462Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.\\n\\n\"}], \"source\": {\"advisory\": \"GHSA-q655-3pj8-9fxq\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-32887\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-29T11:33:23.758613Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:sidekiq:sidekiq:*:*:*:*:*:*:*:*\"], \"vendor\": \"sidekiq\", \"product\": \"sidekiq\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-29T11:34:51.655Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-32887\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-04-19T14:07:11.231Z\", \"datePublished\": \"2024-04-26T21:02:42.462Z\", \"dateUpdated\": \"2024-06-04T17:52:06.961Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…