Vulnerability CVE-2020-7680


Published: 2020-07-20

Description:
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Docsify.js 4.11.4 Cross Site Scripting
Amin Sharifi
23.07.2020

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Docsifyjs -> Docsify 

 References:
http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html
https://github.com/docsifyjs/docsify/issues/1126
https://github.com/docsifyjs/docsify/pull/1128
https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099

Copyright 2024, cxsecurity.com

 

Back to Top