Several cross-site scripting vulnerabilities existed in the deno_doc crate which lead to Self-XSS with deno doc --html.
1.) XSS in generated search_index.js
deno_doc outputed a JavaScript file for searching. However, the generated file used innerHTML on unsanitzed HTML input.
https://github.com/denoland/deno_doc/blob/dc556c848831d7ae48f3eff2ababc6e75eb6b73e/src/html/templates/pages/search.js#L120-L144
2.) XSS via property, method and enum names
deno_doc did not sanitize property names, method names and enum names.
The first XSS most likely didn't have an impact since deno doc --html is expected to be used locally with own packages.
{
"github_reviewed": true,
"severity": "LOW",
"nvd_published_at": "2024-11-25T19:15:09Z",
"cwe_ids": [
"CWE-79"
],
"github_reviewed_at": "2024-11-25T19:34:24Z"
}