Loading HuntDB...

CVE-2012-6708

UNKNOWN
Published 2018-01-18T23:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2012-6708. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

Cross-Site Scripting in jquery

GHSA-2pqj-h3vj-pqgw

Advisory Details

Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution. ## Proof of Concept ``` $("#log").html( $("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html() ); ``` ## Recommendation Update to version 1.9.0 or later.

Affected Packages

npm jquery
ECOSYSTEM: ≥0 <1.9.0
Maven org.webjars.npm:jquery
ECOSYSTEM: ≥0 <1.9.0
NuGet jQuery
ECOSYSTEM: ≥0 <1.9.0
RubyGems jquery-rails
ECOSYSTEM: ≥0 <2.2.0

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

References

Advisory provided by GitHub Security Advisory Database. Published: September 1, 2020, Modified: June 26, 2023

References

HackerOne Reports

Published: 2018-01-18T23:00:00
Last Modified: 2024-08-06T21:36:02.207Z
Copied to clipboard!