Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-11023

Опубликовано: 29 апр. 2020
Источник: redhat
CVSS3: 6.1
EPSS Средний

Описание

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

A flaw was found in jQuery. HTML containing <option> elements from untrusted sources are passed, even after sanitizing, to one of jQuery's DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.

Отчет

Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the pcs component. As PCS does not accept untrusted input, the vulnerable code cannot be controlled by an attacker. Multiple Red Hat offerings use doxygen to build documentation. During this process an affected jquery.js file can be included in the resulting package. The 'gcc' and 'tbb' packages were potentially vulnerable via this method. OpenShift Container Platform 4 is not affected because even though it uses the 'gcc' component, vulnerable code is limited within the libstdc++-docs rpm package, which is not shipped.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-gemsetOut of support scope
Red Hat 3scale API Management Platform 2jqueryNot affected
Red Hat build of Apache Camel for Spring Boot 4org.webjars/jqueryNot affected
Red Hat build of Apache Camel - HawtIO 4io.hawt-projectNot affected
Red Hat Build of Keycloakorg.keycloak-keycloak-parentNot affected
Red Hat build of OptaPlanner 8org.webjars/jqueryNot affected
Red Hat Ceph Storage 3grafanaOut of support scope
Red Hat Ceph Storage 3grafana-containerOut of support scope
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Out of support scope
Red Hat Certificate System 10redhat-pki:10/redhat-pkiNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1850004jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods

EPSS

Процентиль: 97%
0.36851
Средний

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.9
ubuntu
почти 6 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
почти 6 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
почти 6 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
около 1 года назад

Moderate: gcc security update

rocky
около 1 года назад

Moderate: gcc-toolset-14-gcc security update

EPSS

Процентиль: 97%
0.36851
Средний

6.1 Medium

CVSS3