Description
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
Published: 2020-07-20
Score: 6.1 Medium
EPSS: 3.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-1169 docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
Github GHSA Github GHSA GHSA-qpqh-46qj-vwcw Cross-site Scripting in docsify
History

No history.

Subscriptions

Docsifyjs Docsify
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T09:41:01.274Z

Reserved: 2020-01-21T00:00:00.000Z

Link: CVE-2020-7680

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-20T16:15:12.350

Modified: 2024-11-21T05:37:35.990

Link: CVE-2020-7680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses