Skip to content

Commit a8a8f82

Browse files
jasnowpostmodern
authored andcommitted
Added Rspec check for PoC sections inside description field
1 parent b1bb1f7 commit a8a8f82

5 files changed

Lines changed: 4 additions & 71 deletions

File tree

gems/avo/CVE-2023-34102.yml

Lines changed: 0 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -27,41 +27,6 @@ description: |
2727
and attempts to work with it, which may result in dangerous behavior
2828
and code execution.
2929
30-
### PoC
31-
32-
![image](https://user-images.githubusercontent.com/26464774/243437854-933d94c8-4ae0-43fe-b2da-35b103e28796.png)
33-
34-
In the test scenario we choose the demo app and the review
35-
resource which has a polymorphic reviewable field.
36-
37-
![image](https://user-images.githubusercontent.com/26464774/243437954-2d947c6d-4e97-4e91-a442-405e553dd047.png)
38-
39-
Intercepting the request and switching the review[reviewable_type]
40-
from “Fish” to “File” which is a real class inside Rails
41-
42-
![image](https://user-images.githubusercontent.com/26464774/243438031-109de6d0-9370-4318-b18e-c5bcea61cf54.png)
43-
44-
Corrupting the database with unusable classes will cause a crash
45-
at the application while viewing the new record or the index
46-
view (partial DoS)
47-
48-
![image](https://user-images.githubusercontent.com/26464774/243438104-80df5aae-86de-40fc-870d-689a03cae389.png)
49-
50-
Manual delete the corrupted resource in order to recover the
51-
applications functionality
52-
53-
![image](https://user-images.githubusercontent.com/26464774/243438182-1e7eef54-73ba-47d0-b5df-4bad14859af3.png)
54-
55-
Of course it is possible to use other class names or namespaces. The
56-
local development environment displays the backend error message
57-
when visiting a corrupted record. Avo is trying to apply a scope to
58-
this class that does not exist.
59-
60-
![image](https://user-images.githubusercontent.com/26464774/243438257-dbb59153-58a8-4421-b796-f2a0f2c20083.png)
61-
62-
Specifying an invalid class name in the parameter will cause the
63-
application to crash again while trying constanize the provided string
64-
6530
### Impact
6631
6732
The final exploitation of this vulnerability requires more time than

gems/avo/CVE-2023-34103.yml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,6 @@ description: |
2222
the request and modifying the post data, as the trix editor does not
2323
allow adding custom html or js tags on the frontend.
2424
25-
### PoC
26-
27-
![image](https://user-images.githubusercontent.com/26464774/243434868-47857054-9b20-437f-842f-0750d53c9b0e.png)
28-
_Adding javascript in the post request which is used when editing a "post" resource (body is declared as a trix field)_
29-
![image](https://user-images.githubusercontent.com/26464774/243435009-948593a0-5179-4368-977c-ec36d2373925.png)
30-
_Successful execution of JS code on live demo environment_
31-
3225
### Impact
3326
3427
Unlike non-persistent XSS, persistent XSS does not require a social

gems/avo/CVE-2024-22191.yml

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -27,26 +27,6 @@ description: |
2727
the value is taken in lines **38** and **49** and seems to be
2828
interpreted directly as html in lines **44** and **55**.
2929
30-
### PoC
31-
32-
![POC](https://user-images.githubusercontent.com/26570201/295596307-5d4f563e-99c0-4981-a82e-fc42cfd902c5.gif)
33-
34-
To reproduce the vulnerability, follow these steps:
35-
36-
1. Edit an entry with a key_value field.
37-
38-
2. Enter the following payload into the value field:
39-
```POC\\\"> <script>alert('XSS in key_value' );</script> <strong>Outside-tag</strong```
40-
41-
3. Save the entry.
42-
43-
4. Go to the index page and click on the eye icon next to the entry.
44-
45-
The malicious JavaScript code will be executed and an alert box will be displayed.
46-
47-
_On the show and edit page the alert seems not to pop up, but the
48-
strong tag breaks out of the expected html tag_
49-
5030
### Impact
5131
5232
This vulnerability could be used to steal sensitive information from

gems/yard/CVE-2024-27285.yml

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,6 @@ description: |
4545
</script>
4646
```
4747
48-
### PoC (Proof of Concept)
49-
50-
To exploit this vulnerability:
51-
1. Gain access to the generated Yard Doc.
52-
2. Locate and access the "frames.html" file.
53-
3. Construct a URL containing the malicious payload in the hash
54-
segment, for instance: `#!javascript:xss` for v0.9.34, and
55-
`#:javascript:xss` for v0.9.35
56-
5748
### Impact
5849
5950
This XSS vulnerability presents a substantial threat by enabling

spec/advisory_example.rb

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,10 @@
140140
expect(subject).to_not include("\\n\\n")
141141
end
142142

143+
it "must not have PoC sections" do
144+
expect(subject).to_not include("### PoC")
145+
end
146+
143147
it { expect(subject).to be_kind_of(String) }
144148
it { expect(subject).not_to be_empty }
145149
end

0 commit comments

Comments
 (0)