Description
Versions of jquery
prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove <script>
HTML tags that contain a whitespace character, i.e: </script >
, which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim’s browser.
Recommendation
Update the jquery
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 1.2.1, < 1.9.0
- Patched version(s): 1.9.0
References
- GHSA-q4m3-2j7h-f7xw
- snyk.io
- www.oracle.com
- supportportal.juniper.net
- security.netapp.com
- CVE-2020-7656
- CWE-79
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- jsPDF Denial of Service (DoS) - CVE-2025-57810
- Spoofing attack in swagger-ui - CVE-2018-25031
- MailDev Remote Code Execution - CVE-2024-27448
- vxe-table prototype pollution - CVE-2024-57080
- Tags:
- npm
- jquery
Anything's wrong? Let us know Last updated on October 10, 2024