sidekiq-unique-jobs 7.0.0.beta16

2 security vulnerabilities found in version 7.0.0.beta16

sidekiq-unique-jobs UI server vulnerable to XSS & RCE in Redis

high severity CVE-2024-25122
high severity CVE-2024-25122
Patched versions: ~> 7.1.33, >= 8.0.7

Cross site scripting (XSS) potentially exposing cookies / sessions / localStorage, fixed by sidekiq-unique-jobs v8.0.7.

Details

Specially crafted URL query parameters handled by any of the following endpoints of sidekiq-unique-jobs' "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in.

If your sidekiq-unique-jobs web UI is mounted at /sidekiq, the vulnerable paths and query parameters are:

  • /sidekiq/changelogs
    • filter
    • count
  • /sidekiq/locks
    • filter
    • count
  • /sidekiq/expiring_locks
    • filter

Impact

This is a vulnerability of critical severity, which impacts many thousands of sites, since sidekiq-unique-jobs is widely deployed across the industry, with multiple attack vectors.

Patches

The fix for the XSS vulnerability was released in sidekiq-unique-jobs v8.0.7.

Cross Site Scripting vulnerability in Contribsys Sidekiq

medium severity CVE-2023-46950
medium severity CVE-2023-46950
Patched versions: ~> 7.1.33, >= 8.0.7

Cross Site Scripting vulnerability in Contribsys Sidekiq v.6.5.8 allows a remote attacker to obtain sensitive information via a crafted URL to the filter functions.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.