CVE Vulnerabilities

CVE-2023-34102

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jun 05, 2023 | Modified: Jun 12, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Avo is an open source ruby on rails admin panel creation framework. The polymorphic field type stores the classes to operate on when updating a record with user input, and does not validate them in the back end. This can lead to unexpected behavior, remote code execution, or application crashes when viewing a manipulated record. This issue has been addressed in commit ec117882d which is expected to be included in subsequent releases. Users are advised to limit access to untrusted users until a new release is made.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

Name Vendor Start Version End Version
Avo Avohq * 2.33.2 (including)
Avo Avohq 3.0.0-pre12 (including) 3.0.0-pre12 (including)

Potential Mitigations

References