Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2pqj-h3vj-pqgw

Опубликовано: 01 сент. 2020
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

Cross-Site Scripting in jquery

Affected versions of jquery are vulnerable to cross-site scripting. This occurs because the main jquery function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that jquery may interpret HTML as selectors when given certain inputs, allowing for client side code execution.

Proof of Concept

$("#log").html( $("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html() );

Recommendation

Update to version 1.9.0 or later.

Ссылки

Пакеты

Наименование

jquery

npm
Затронутые версииВерсия исправления

<= 1.8.3

1.9.0

Наименование

org.webjars.npm:jquery

maven
Затронутые версииВерсия исправления

<= 1.8.3

1.9.0

Наименование

jQuery

nuget
Затронутые версииВерсия исправления

<= 1.8.3

1.9.0

Наименование

jquery-rails

rubygems
Затронутые версииВерсия исправления

< 2.2.0

2.2.0

EPSS

Процентиль: 79%
0.01354
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-64
CWE-79

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.8
redhat
около 8 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
nvd
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 6.1
debian
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attack ...

EPSS

Процентиль: 79%
0.01354
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-64
CWE-79