GHSA-v2r9-c84j-v7xm

Suggest an improvement
Source
https://github.com/advisories/GHSA-v2r9-c84j-v7xm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-v2r9-c84j-v7xm/GHSA-v2r9-c84j-v7xm.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-v2r9-c84j-v7xm
Aliases
  • CVE-2013-0256
Published
2017-10-24T18:33:37Z
Modified
2024-02-22T05:29:48.925623Z
Summary
RDoc contains XSS vulnerability
Details

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

Database specific
{
    "nvd_published_at": "2013-03-01T05:40:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:56:28Z"
}
References

Affected packages

RubyGems / rdoc

Package

Name
rdoc
Purl
pkg:gem/rdoc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
3.12.1

Affected versions

2.*

2.3.0
2.4.0
2.4.1
2.4.2
2.4.3
2.5
2.5.1
2.5.2
2.5.3
2.5.4
2.5.5
2.5.6
2.5.7
2.5.8
2.5.9
2.5.10
2.5.11

3.*

3.0
3.0.1
3.1
3.2
3.3
3.4
3.5
3.5.1
3.5.2
3.5.3
3.6
3.6.1
3.7
3.8
3.9
3.9.1
3.9.2
3.9.3
3.9.4
3.9.5
3.10.pre.1
3.10.pre.2
3.10.pre.3
3.10
3.11
3.12