CVE-2024-27285 Affecting yard package, versions <0.9.16-1+deb10u1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-YARD-6305192
  • published29 Feb 2024
  • disclosed28 Feb 2024

Introduced: 28 Feb 2024

CVE-2024-27285  (opens in a new tab)

How to fix?

Upgrade Debian:10 yard to version 0.9.16-1+deb10u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream yard package and not the yard package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.

CVSS Scores

version 3.1