CVE-2024-27285

NameCVE-2024-27285
DescriptionYARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3753-1, DSA-5635-1
Debian Bugs1065118

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
yard (PTS)buster0.9.16-1vulnerable
buster (security)0.9.16-1+deb10u1fixed
bullseye0.9.24-1vulnerable
bullseye (security)0.9.24-1+deb11u1fixed
bookworm0.9.28-2vulnerable
bookworm (security)0.9.28-2+deb12u2fixed
sid, trixie0.9.36-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
yardsourcebuster0.9.16-1+deb10u1DLA-3753-1
yardsourcebullseye0.9.24-1+deb11u1DSA-5635-1
yardsourcebookworm0.9.28-2+deb12u2DSA-5635-1
yardsource(unstable)0.9.36-11065118

Notes

https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
Fixed by: https://github.com/lsegal/yard/commit/d78fc393d603c4fc35975969296ed381146a29d4 (v0.9.35)
Followup: https://github.com/lsegal/yard/commit/c88406e4b78f8dd4ba38c79eea0bcec716dbbef8 (v0.9.36)
Followup: https://github.com/lsegal/yard/commit/2a0b9990b64ceeeb0456177c593e36e204a06df1 (v0.9.36)
Followup: https://github.com/lsegal/yard/commit/a831a596b2a7cabdd2e17855dd179af2ebf3d559 (v0.9.36)

Search for package or bug name: Reporting problems