CVE-2023-34102

moderate-risk
Published 2023-06-05

Avo is an open source ruby on rails admin panel creation framework. The polymorphic field type stores the classes to operate on when updating a record with user input, and does not validate them in the back end. This can lead to unexpected behavior, remote code execution, or application crashes when viewing a manipulated record. This issue has been addressed in commit `ec117882d` which is expected to be included in subsequent releases. Users are advised to limit access to untrusted users until a new release is made.

Do I need to act?

~
7.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.3/10 High
NETWORK / LOW complexity

Affected Products (2)

Avo
Avo

Affected Vendors

46
/ 100
moderate-risk
Severity 29/34 · Critical
Exploitability 10/34 · Low
Exposure 7/34 · Low