Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-25122
HistoryFeb 13, 2024 - 7:05 p.m.

CVE-2024-25122 Cross-site Scripting sidekiq-unique-jobs UI server vulnerability

2024-02-1319:05:27
CWE-79
GitHub_M
www.cve.org
2
cross-site scripting
sidekiq-unique-jobs
open source
web ui
super-user attacker
authorized victim
get request
admin
vulnerability
version 7.1.33
version 8.0.7
upgrade

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

7.3

Confidence

High

EPSS

0

Percentile

9.0%

sidekiq-unique-jobs is an open source project which prevents simultaneous Sidekiq jobs with the same unique arguments to run. Specially crafted GET request parameters handled by any of the following endpoints of sidekiq-unique-jobs’ “admin” web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in. 1. /changelogs, 2. /locks or 3. /expiring_locks. This issue has been addressed in versions 7.1.33 and 8.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "mhenrixon",
    "product": "sidekiq-unique-jobs",
    "versions": [
      {
        "version": "< 7.1.33",
        "status": "affected"
      },
      {
        "version": ">= 8.0.0, < 8.0.7",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

7.3

Confidence

High

EPSS

0

Percentile

9.0%