Description
YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
References (7)
Core 7
Core References
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
Issue Tracking, Patch x_refsource_misc
https://github.com/lsegal/yard/pull/1538
Patch x_refsource_misc
https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa
Patch x_refsource_misc
https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be
Exploit, Third Party Advisory x_refsource_misc
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml
Scores
CVSS v3
5.4
EPSS
0.0332
EPSS Percentile
87.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (4)
debian/debian_linux
10.0
fedoraproject/fedora
38
rubygems/yard
0 - 0.9.36RubyGems
yardoc/yard
< 0.9.36
Published
Feb 28, 2024
Tracked Since
Feb 18, 2026