Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jpcq-cgw6-v4j6

Опубликовано: 29 апр. 2020
Источник: github
Github: Прошло ревью
CVSS3: 6.9

Описание

Potential XSS vulnerability in jQuery

Impact

Passing HTML containing <option> elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.

Patches

This problem is patched in jQuery 3.5.0.

Workarounds

To workaround this issue without upgrading, use DOMPurify with its SAFE_FOR_JQUERY option to sanitize the HTML string before passing it to a jQuery method.

References

https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

For more information

If you have any questions or comments about this advisory, search for a relevant issue in the jQuery repo. If you don't find an answer, open a new issue.

Ссылки

Пакеты

Наименование

jquery

npm
Затронутые версииВерсия исправления

>= 1.0.3, < 3.5.0

3.5.0

Наименование

jquery-rails

rubygems
Затронутые версииВерсия исправления

< 4.4.0

4.4.0

Наименование

jQuery

nuget
Затронутые версииВерсия исправления

>= 1.0.3, < 3.5.0

3.5.0

Наименование

org.webjars.npm:jquery

maven
Затронутые версииВерсия исправления

>= 1.0.3, < 3.5.0

3.5.0

Наименование

components/jquery

composer
Затронутые версииВерсия исправления

>= 1.0.3, < 3.5.0

3.5.0

EPSS

Процентиль: 93%
0.118
Средний

6.9 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
redhat
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-14-gcc security update

EPSS

Процентиль: 93%
0.118
Средний

6.9 Medium

CVSS3

Дефекты

CWE-79