CVE-2024-32887

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-32887
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32887.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-32887
Aliases
Related
Published
2024-04-26T21:15:49Z
Modified
2024-10-08T04:11:46.681488Z
Summary
[none]
Details

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

References

Affected packages

Git / github.com/sidekiq/sidekiq

Affected ranges

Type
GIT
Repo
https://github.com/sidekiq/sidekiq
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

7-0
list

v0.*

v0.10.0
v0.5.0
v0.5.1
v0.7.0
v0.8.0

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.1.4
v1.2.0
v1.2.1

v2.*

v2.0.0
v2.0.1
v2.0.3
v2.1.0
v2.10.0
v2.11.0
v2.11.1
v2.11.2
v2.12.0
v2.12.1
v2.12.3
v2.12.4
v2.13.0
v2.13.1
v2.14.0
v2.14.1
v2.15.2
v2.16.1
v2.17.0
v2.17.1
v2.17.2
v2.17.4
v2.17.7
v2.2.1
v2.3.2
v2.3.3
v2.4.0
v2.5.0
v2.5.2
v2.5.3
v2.6.0
v2.6.1
v2.6.2
v2.6.3
v2.6.4
v2.6.5
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v2.7.4
v2.7.5
v2.8.0

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.1.1
v3.1.2
v3.1.3
v3.1.4
v3.2.0
v3.2.1
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.6
v3.3.0
v3.3.1
v3.3.2
v3.3.3
v3.3.4
v3.4.0
v3.4.1
v3.4.2
v3.5.0
v3.5.1
v3.5.2
v3.5.3
v3.5.4

v4.*

v4.0.0
v4.0.0.pre1
v4.0.0.pre2
v4.0.1
v4.0.2
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.2.0
v4.2.1
v4.2.10
v4.2.2
v4.2.3
v4.2.4
v4.2.5
v4.2.6
v4.2.7
v4.2.8
v4.2.9

v5.*

v5.0.0
v5.0.0.beta1
v5.0.0.beta2
v5.0.0.beta3
v5.0.0.rc1
v5.0.1
v5.0.2
v5.0.3
v5.0.4
v5.0.5
v5.1.0
v5.1.1
v5.1.2
v5.1.3
v5.2.0
v5.2.1
v5.2.2
v5.2.3
v5.2.4
v5.2.5
v5.2.6
v5.2.7

v6.*

v6.0.0
v6.0.0.pre1
v6.0.1
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.1.0
v6.1.1
v6.1.2
v6.1.3
v6.2.0
v6.2.1
v6.2.2
v6.3.0
v6.3.1
v6.4.0
v6.4.1
v6.4.2
v6.5.0
v6.5.1
v6.5.2
v6.5.3
v6.5.4
v6.5.5
v6.5.6
v6.5.7

v7.*

v7.0.0
v7.0.0.beta1
v7.0.1
v7.0.2
v7.0.3
v7.0.4
v7.0.5
v7.0.6
v7.0.7
v7.0.8
v7.0.9
v7.1.0
v7.1.1
v7.1.2
v7.1.3
v7.1.4
v7.1.5
v7.1.6
v7.2.0
v7.2.1
v7.2.2
v7.2.3