docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: snyk
Published: 2020-07-20T15:22:13
Updated: 2024-08-04T09:41:01.274Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7680

No data.

Status : Modified
Published: 2020-07-20T16:15:12.350
Modified: 2024-11-21T05:37:35.990
Link: CVE-2020-7680

No data.