Description
Versions of jquery prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove <script> HTML tags that contain a whitespace character, i.e: </script >, which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim’s browser.
Recommendation
Update the jquery package to the latest compatible version. Followings are version details:
- Affected version(s): >= 1.2.1, < 1.9.0
- Patched version(s): 1.9.0
References
- GHSA-q4m3-2j7h-f7xw
- snyk.io
- www.oracle.com
- supportportal.juniper.net
- security.netapp.com
- CVE-2020-7656
- CWE-79
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Cross-site Scripting in tableexport.jquery.plugin - CVE-2022-1291
- Cross-site Scripting in jquery.json-viewer - CVE-2022-30241
- Cross-site Scripting in Joplin (GHSA-6r7x-hc8m-985r) - CVE-2020-9038
- Cross-site Scripting in dompurify (GHSA-63q7-h895-m982) - CVE-2020-26870
- Tags:
- npm
- jquery
Anything's wrong? Let us know Last updated on October 10, 2024