Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-27285
HistoryFeb 28, 2024 - 7:22 p.m.

CVE-2024-27285 YARD's default template vulnerable to Cross-site Scripting in generated frames.html

2024-02-2819:22:15
CWE-79
GitHub_M
github.com
2
yard documentation tool
cross-site scripting
frames.html
javascript
0.9.36
vulnerability

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

5.6

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

YARD is a Ruby Documentation tool. The “frames.html” file within the Yard Doc’s generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the “frames.erb” template file. This vulnerability is fixed in 0.9.36.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:yardoc:yard:*:*:*:*:*:*:*:*"
    ],
    "vendor": "yardoc",
    "product": "yard",
    "versions": [
      {
        "status": "affected",
        "version": "0.9.36"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

5.6

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial