docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2020-07-20T15:22:13

Updated: 2024-08-04T09:41:01.274Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7680

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-20T16:15:12.350

Modified: 2024-11-21T05:37:35.990

Link: CVE-2020-7680

cve-icon Redhat

No data.