-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - yard-0.8.7.6.gem
YARD is a documentation generation tool for the Ruby programming language. It enables the user to generate consistent, usable documentation that can be exported to a number of formats very easily, and also supports extending for custom Ruby constructs such as custom class level definitions.
Library home page: https://rubygems.org/gems/yard-0.8.7.6.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/3.2.0/cache/yard-0.8.7.6.gem
Found in HEAD commit: 9461b71edb4933319230643eed039858109d9238
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (yard version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2024-27285 | 5.4 | yard-0.8.7.6.gem | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-27285
Vulnerable Library - yard-0.8.7.6.gem
YARD is a documentation generation tool for the Ruby programming language. It enables the user to generate consistent, usable documentation that can be exported to a number of formats very easily, and also supports extending for custom Ruby constructs such as custom class level definitions.
Library home page: https://rubygems.org/gems/yard-0.8.7.6.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/3.2.0/cache/yard-0.8.7.6.gem
Dependency Hierarchy:
- ❌ yard-0.8.7.6.gem (Vulnerable Library)
Found in HEAD commit: 9461b71edb4933319230643eed039858109d9238
Found in base branch: master
Vulnerability Details
YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
Publish Date: 2024-02-28
URL: CVE-2024-27285
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Step up your Open Source Security Game with Mend here