Lucene search

K
githubGitHub Advisory DatabaseGHSA-536Q-8GXX-M782
HistorySep 11, 2019 - 11:02 p.m.

Cross-Site Scripting in dojo

2019-09-1123:02:57
CWE-79
GitHub Advisory Database
github.com
78

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.042 Low

EPSS

Percentile

92.2%

Versions of dojo prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the _testCommon.js and runner.html test files, allowing attackers to execute arbitrary JavaScript in the victim’s browser.

Recommendation

Upgrade to version 1.4.2 or later.

Affected configurations

Vulners
Node
dojo_toolkitdojo_toolkitRange<1.10.10
OR
dojo_toolkitdojo_toolkitRange<1.11.6
OR
dojo_toolkitdojo_toolkitRange<1.12.4
OR
dojo_toolkitdojo_toolkitMatch1.13.0
CPENameOperatorVersion
dojolt1.10.10
dojolt1.11.6
dojolt1.12.4
dojoeq1.13.0

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.042 Low

EPSS

Percentile

92.2%