Bug 1220646 (CVE-2024-27285)

Summary: VUL-0: CVE-2024-27285: rubygem-yard: XSS in generated frames.html of default YARD template
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Marcus Rückert <mrueckert>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: carlos.lopez, dcermak, mrueckert, stoyan.manolov
Version: unspecifiedFlags: stoyan.manolov: needinfo? (mrueckert)
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/395572/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-27285:5.4:(AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-02-29 10:11:30 UTC
YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file.  This vulnerability is fixed in 0.9.35.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-27285
https://www.cve.org/CVERecord?id=CVE-2024-27285
https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be
https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
Comment 1 Carlos López 2024-02-29 10:12:35 UTC
Relevant for SUSE:SLE-12-SP1:Update, Backports and Factory.