Name | CVE-2024-27285 |
Description | YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3753-1, DSA-5635-1 |
Debian Bugs | 1065118 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
yard (PTS) | bullseye (security), bullseye | 0.9.24-1+deb11u1 | fixed |
| bookworm, bookworm (security) | 0.9.28-2+deb12u2 | fixed |
| sid, trixie | 0.9.36-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
Fixed by: https://github.com/lsegal/yard/commit/d78fc393d603c4fc35975969296ed381146a29d4 (v0.9.35)
Followup: https://github.com/lsegal/yard/commit/c88406e4b78f8dd4ba38c79eea0bcec716dbbef8 (v0.9.36)
Followup: https://github.com/lsegal/yard/commit/2a0b9990b64ceeeb0456177c593e36e204a06df1 (v0.9.36)
Followup: https://github.com/lsegal/yard/commit/a831a596b2a7cabdd2e17855dd179af2ebf3d559 (v0.9.36)