Lucene search

K
rubygemsRubySecRUBY:JQUERY-RAILS-2020-11022
HistoryApr 28, 2020 - 9:00 p.m.

Potential XSS vulnerability in jQuery

2020-04-2821:00:00
RubySec
github.com
12

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N

Impact

Passing HTML from untrusted sources - even after sanitizing it - to
one of jQuery’s DOM manipulation methods (i.e. .html(), .append(),
and others) may execute untrusted code.

Patches

This problem is patched in jQuery 3.5.0.

Workarounds

To workaround the issue without upgrading, adding the following to
your code:

jQuery.htmlPrefilter = function( html ) {
  return html;
};

You need to use at least jQuery 1.12/2.2 or newer to be able to
apply this workaround.

References

https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://jquery.com/upgrade-guide/3.5/

For more information

If you have any questions or comments about this advisory, search
for a relevant issue in
the jQuery repo.

If you don’t find an answer, open a new issue."

Affected configurations

Vulners
Node
rubyjquery-railsRange3.5.0
VendorProductVersionCPE
rubyjquery-rails*cpe:2.3:a:ruby:jquery-rails:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N