Cross-site Scripting (XSS) Affecting jquery package, versions <1.6.4-1
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.31% (70th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-JQUERY-290117
- published 8 Mar 2013
- disclosed 8 Mar 2013
How to fix?
Upgrade Debian:10
jquery
to version 1.6.4-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream jquery
package and not the jquery
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
References
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E
- http://blog.jquery.com/2011/09/01/jquery-1-6-3-released/
- http://bugs.jquery.com/ticket/9521
- https://security-tracker.debian.org/tracker/CVE-2011-4969
- https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05232730
- http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html
- https://security.netapp.com/advisory/ntap-20190416-0007/
- http://www.openwall.com/lists/oss-security/2013/01/31/3
- http://www.securityfocus.com/bid/58458
- http://www.securitytracker.com/id/1036620
- http://www.ubuntu.com/usn/USN-1722-1
- http://www.osvdb.org/80056
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E