CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
10.3%
YARD is vulnerable to Cross-site Scripting (XSS). The vulnerability is due to improper sanitization of user input within the frames.erb
template file, allowing an attacker to inject arbitrary JavaScript into the page.
github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa
github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be
github.com/lsegal/yard/pull/1538
github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml
lists.debian.org/debian-lts-announce/2024/03/msg00006.html
lists.fedoraproject.org/archives/list/[email protected]/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/