Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-6708

Опубликовано: 18 янв. 2018
Источник: debian
EPSS Низкий

Описание

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jqueryfixed1.11.3+dfsg-1package
jqueryignoredjessiepackage
jqueryignoredwheezypackage

Примечания

  • https://bugs.jquery.com/ticket/11290

  • https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d

  • https://snyk.io/vuln/npm:jquery:20120206

  • 1.9 release introduced backwards incompatible changes to fix this, so may be too invasive to fix

EPSS

Процентиль: 79%
0.01354
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.8
redhat
около 8 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
nvd
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 6.1
github
почти 5 лет назад

Cross-Site Scripting in jquery

EPSS

Процентиль: 79%
0.01354
Низкий