Summary The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. Details The vulnerability stems from mishandling user-controlled data retrieved from the URL hash in the embedded JavaScript code within the "frames.erb" template file. Specifically, the script lacks proper sanitization of the hash data before utilizing it to establish the top-level window's location. This oversight permits an attacker to inject malicious JavaScript payloads through carefully crafted URLs.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1a0fc49dd9e7cadbc5f24f4958ba0bb17a2b727b commit 1a0fc49dd9e7cadbc5f24f4958ba0bb17a2b727b Author: Hans de Graaff <graaff@gentoo.org> AuthorDate: 2024-05-26 06:56:29 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2024-05-26 06:56:45 +0000 dev-ruby/yard: drop 0.9.34, 0.9.34-r2 Bug: https://bugs.gentoo.org/926069 Signed-off-by: Hans de Graaff <graaff@gentoo.org> dev-ruby/yard/Manifest | 3 -- dev-ruby/yard/yard-0.9.34-r2.ebuild | 76 ------------------------------------- dev-ruby/yard/yard-0.9.34.ebuild | 68 --------------------------------- 3 files changed, 147 deletions(-)