CVE-2020-7656: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
(updated )
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove “” HTML tags that contain a whitespace character, i.e: “”, which results in the enclosed script logic to be executed.
References
- github.com/advisories/GHSA-q4m3-2j7h-f7xw
- github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js
- github.com/rails/jquery-rails/blob/master/CHANGELOG.md
- github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js
- github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-7656.yml
- nvd.nist.gov/vuln/detail/CVE-2020-7656
- security.netapp.com/advisory/ntap-20200528-0001/
- snyk.io/vuln/SNYK-JS-JQUERY-569619
- supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
- www.oracle.com/security-alerts/cpujul2022.html
Detect and mitigate CVE-2020-7656 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →