org.webjars.npm:docsify@4.9.4 vulnerabilities
-
latest version
4.13.1
-
latest non vulnerable version
-
first published
4 years ago
-
latest version published
8 months ago
-
licenses detected
- [4.9.4,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:docsify package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.npm:docsify is a magical documentation site generator. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to bypass the remediation done by
PoC
Note: The fix for this issue is within release 4.12.1, not 4.12.0 How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.13.1)
|
org.webjars.npm:docsify is a magical documentation site generator. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page. PoC
How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.13.1)
|