Description
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
Remediation
References
https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593
https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe
http://seclists.org/fulldisclosure/2021/Feb/71
http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html
Related Vulnerabilities
CVE-2023-25765 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2020-28458 Vulnerability in maven package org.webjars.npm:datatables.net
CVE-2020-24855 Vulnerability in npm package @easy-team/easywebpack-cli
CVE-2022-45392 Vulnerability in maven package io.jenkins.plugins:cavisson-ns-nd-integration