Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-11023

Опубликовано: 29 апр. 2020
Источник: redhat
CVSS3: 6.1
EPSS Средний

Описание

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

A flaw was found in jQuery. HTML containing <option> elements from untrusted sources are passed, even after sanitizing, to one of jQuery's DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.

Отчет

Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the pcs component. As PCS does not accept untrusted input, the vulnerable code cannot be controlled by an attacker. Multiple Red Hat offerings use doxygen to build documentation. During this process an affected jquery.js file can be included in the resulting package. The 'gcc' and 'tbb' packages were potentially vulnerable via this method. OpenShift Container Platform 4 is not affected because even though it uses the 'gcc' component, vulnerable code is limited within the libstdc++-docs rpm package, which is not shipped. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Static code analysis controls ensure that security flaws, including XSS vulnerabilities, are detected early in development by scanning code for improper input handling. This prevents vulnerable code from reaching production and encourages our developers to follow secure coding practices. System monitoring controls play a crucial role in detecting and responding to XSS attacks by analyzing logs, monitoring user behavior, and generating alerts for suspicious activity. Meanwhile, AWS WAF (Web Application Firewall) adds an extra layer of defense by filtering and blocking malicious input before it reaches the platform and/or application. Together, these controls create a defense-in-depth approach, reducing the risk of XSS exploitation by preventing, detecting, and mitigating attacks at multiple levels.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-gemsetOut of support scope
Red Hat 3scale API Management Platform 2jqueryNot affected
Red Hat build of Apache Camel for Spring Boot 4org.webjars/jqueryNot affected
Red Hat build of Apache Camel - HawtIO 4io.hawt-projectNot affected
Red Hat Build of Keycloakorg.keycloak-keycloak-parentNot affected
Red Hat build of OptaPlanner 8org.webjars/jqueryNot affected
Red Hat Ceph Storage 3grafanaOut of support scope
Red Hat Ceph Storage 3grafana-containerOut of support scope
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Out of support scope
Red Hat Certificate System 10redhat-pki:10/redhat-pkiNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1850004jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods

EPSS

Процентиль: 93%
0.118
Средний

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-14-gcc security update

rocky
4 месяца назад

Moderate: gcc-toolset-13-gcc security update

EPSS

Процентиль: 93%
0.118
Средний

6.1 Medium

CVSS3