Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. readthedocs-sphinx-search
  4. ›
  5. GMS-2024-29

GMS-2024-29: readthedocs-sphinx-search vulnerable to cross-site scripting when including search results from malicious projects

January 16, 2024

Impact

This vulnerability could have allowed an attacker to include arbitrary HTML content in search results by having a user search a malicious project. This was due to our search client not correctly escaping all user content from search results. You can find more information in the advisory published in our readthedocs.org repo.

Users of this extension should update to the 0.3.2 version, and trigger a new build.

This issue was discovered by a member of our team, and we have seen no signs that this vulnerability was exploited in the wild.

Patches

This issue has been patched in our 0.3.2 version.

References

  • https://github.com/readthedocs/readthedocs-sphinx-search/commit/8c6f6d01e88e72ef32ed0c220b6c19d1e1121c73

For more information

If you have any questions or comments about this advisory, email us at security@readthedocs.org (PGP)

References

  • github.com/advisories/GHSA-xgfm-fjx6-62mj
  • github.com/readthedocs/readthedocs-sphinx-search/commit/8c6f6d01e88e72ef32ed0c220b6c19d1e1121c73
  • github.com/readthedocs/readthedocs-sphinx-search/security/advisories/GHSA-xgfm-fjx6-62mj

Code Behaviors & Features

Detect and mitigate GMS-2024-29 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.3.1

Fixed versions

  • 0.3.2

Solution

Upgrade to version 0.3.2 or above.

Source file

pypi/readthedocs-sphinx-search/GMS-2024-29.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:02 +0000.