CVE-2023-34102
moderate-risk
Published 2023-06-05
Avo is an open source ruby on rails admin panel creation framework. The polymorphic field type stores the classes to operate on when updating a record with user input, and does not validate them in the back end. This can lead to unexpected behavior, remote code execution, or application crashes when viewing a manipulated record. This issue has been addressed in commit `ec117882d` which is expected to be included in subsequent releases. Users are advised to limit access to untrusted users until a new release is made.
Do I need to act?
~
7.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.3/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Avo
Avo
Affected Vendors
References (4)
46
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
10/34 · Low
Exposure
7/34 · Low