CVE-2024-32887

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-32887
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-32887.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-32887
Aliases
Related
Published
2024-04-26T21:02:42Z
Modified
2025-10-30T20:25:53.202533Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Reflected XSS in sidekiq
Details

Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/sidekiq/sidekiq

Affected ranges

Type
GIT
Repo
https://github.com/sidekiq/sidekiq
Events

Affected versions

v7.*

v7.2.0
v7.2.1
v7.2.2
v7.2.3