RubySec

Providing security resources for the Ruby community

CVE-2024-25122 (sidekiq-unique-jobs): sidekiq-unique-jobs UI server vulnerable to XSS & RCE in Redis

ADVISORIES

GEM

sidekiq-unique-jobs

SEVERITY

CVSS v3.x: 7.1 (High)

PATCHED VERSIONS

  • ~> 7.1.33
  • >= 8.0.7

DESCRIPTION

Cross site scripting (XSS) potentially exposing cookies / sessions / localStorage, fixed by sidekiq-unique-jobs v8.0.7.

Details

Specially crafted URL query parameters handled by any of the following endpoints of sidekiq-unique-jobs’ "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in.

If your sidekiq-unique-jobs web UI is mounted at /sidekiq, the vulnerable paths and query parameters are:

  • /sidekiq/changelogs
    • filter
    • count
  • /sidekiq/locks
    • filter
    • count
  • /sidekiq/expiring_locks
    • filter

Impact

This is a vulnerability of critical severity, which impacts many thousands of sites, since sidekiq-unique-jobs is widely deployed across the industry, with multiple attack vectors.

Patches

The fix for the XSS vulnerability was released in sidekiq-unique-jobs v8.0.7.

RELATED