YARD is vulnerable to Cross-site Scripting (XSS). The vulnerability is due to improper sanitization of user input within the frames.erb
template file, allowing an attacker to inject arbitrary JavaScript into the page.
github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa
github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be
github.com/lsegal/yard/pull/1538
github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml
lists.debian.org/debian-lts-announce/2024/03/msg00006.html
lists.fedoraproject.org/archives/list/[email protected]/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/