docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1169 docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
Github GHSA Github GHSA GHSA-qpqh-46qj-vwcw Cross-site Scripting in docsify
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T09:41:01.274Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7680

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-20T16:15:12.350

Modified: 2024-11-21T05:37:35.990

Link: CVE-2020-7680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses