CVE-2024-27285

YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yardoc:yard:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Feb 2025, 15:31

Type Values Removed Values Added
First Time Yardoc yard
Yardoc
Debian
Fedoraproject fedora
Debian debian Linux
Fedoraproject
References () https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa - () https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa - Patch
References () https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be - () https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be - Patch
References () https://github.com/lsegal/yard/pull/1538 - () https://github.com/lsegal/yard/pull/1538 - Issue Tracking, Patch
References () https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc - () https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc - Exploit, Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html - () https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html - Mailing List
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/ - Mailing List
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:yardoc:yard:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

21 Nov 2024, 09:04

Type Values Removed Values Added
References () https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa - () https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa -
References () https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be - () https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be -
References () https://github.com/lsegal/yard/pull/1538 - () https://github.com/lsegal/yard/pull/1538 -
References () https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc - () https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc -
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml -
References () https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html - () https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/ -

21 Mar 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/ -

06 Mar 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html -

01 Mar 2024, 17:15

Type Values Removed Values Added
Summary YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.35. YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
References
  • () https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa -
  • () https://github.com/lsegal/yard/pull/1538 -
  • () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml -

28 Feb 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 20:15

Updated : 2025-02-14 15:31


NVD link : CVE-2024-27285

Mitre link : CVE-2024-27285

CVE.ORG link : CVE-2024-27285


JSON object : View

Products Affected

yardoc

  • yard

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')