Versions of jquery
prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove <script>
HTML tags that contain a whitespace character, i.e: </script >
, which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim’s browser.
Upgrade to version 1.9.0 or later.
github.com/jquery/jquery
github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203
github.com/rails/jquery-rails/blob/master/CHANGELOG.md#220-19-january-2013
github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L7481
github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-7656.yml
nvd.nist.gov/vuln/detail/CVE-2020-7656
security.netapp.com/advisory/ntap-20200528-0001
snyk.io/vuln/SNYK-JS-JQUERY-569619
supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
www.oracle.com/security-alerts/cpujul2022.html