Описание
Cross-Site Scripting in jquery
Affected versions of jquery
are vulnerable to cross-site scripting. This occurs because the main jquery
function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that jquery
may interpret HTML as selectors when given certain inputs, allowing for client side code execution.
Proof of Concept
Recommendation
Update to version 1.9.0 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-16011
- https://nvd.nist.gov/vuln/detail/CVE-2012-6708
- https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
- https://web.archive.org/web/20200227132049/http://www.securityfocus.com/bid/102792
- https://snyk.io/vuln/npm:jquery:20120206
- https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450223
- https://research.insecurelabs.org/jquery/test
- https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
- https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
- https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2012-6708.yml
- https://github.com/rails/jquery-rails/blob/v2.2.0/vendor/assets/javascripts/jquery.js#L67
- https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L59
- https://bugs.jquery.com/ticket/9521
- https://bugs.jquery.com/ticket/6429
- https://bugs.jquery.com/ticket/12531
- https://bugs.jquery.com/ticket/11290
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
- http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
- http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html
Пакеты
jquery
<= 1.8.3
1.9.0
org.webjars.npm:jquery
<= 1.8.3
1.9.0
jQuery
<= 1.8.3
1.9.0
jquery-rails
< 2.2.0
2.2.0
Связанные уязвимости
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attack ...