OpenTok-Ruby-SDK icon indicating copy to clipboard operation
OpenTok-Ruby-SDK copied to clipboard

yard-0.9.34.gem: 1 vulnerabilities (highest severity is: 5.4)

Open mend-for-github-com[bot] opened this issue 1 year ago • 0 comments

Vulnerable Library - yard-0.9.34.gem

YARD is a documentation generation tool for the Ruby programming language. It enables the user to generate consistent, usable documentation that can be exported to a number of formats very easily, and also supports extending for custom Ruby constructs such as custom class level definitions.

Library home page: https://rubygems.org/gems/yard-0.9.34.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /home/wss-scanner/.gem/ruby/3.2.0/cache/yard-0.9.34.gem

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (yard version) Remediation Possible** Reachability
CVE-2024-27285 Medium 5.4 Not Defined 0.0% yard-0.9.34.gem Direct yard - 0.9.35

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-27285

Vulnerable Library - yard-0.9.34.gem

YARD is a documentation generation tool for the Ruby programming language. It enables the user to generate consistent, usable documentation that can be exported to a number of formats very easily, and also supports extending for custom Ruby constructs such as custom class level definitions.

Library home page: https://rubygems.org/gems/yard-0.9.34.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /home/wss-scanner/.gem/ruby/3.2.0/cache/yard-0.9.34.gem

Dependency Hierarchy:

  • :x: yard-0.9.34.gem (Vulnerable Library)

Found in base branch: main

Vulnerability Details

YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.

Publish Date: 2024-02-28

URL: CVE-2024-27285

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc

Release Date: 2024-02-28

Fix Resolution: yard - 0.9.35

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.


:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.