CVE-2020-7656: Cross-Site Scripting in jquery
(updated )
Versions of jquery
prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove <script>
HTML tags that contain a whitespace character, i.e: </script >
, which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim’s browser.
References
- github.com/advisories/GHSA-q4m3-2j7h-f7xw
- github.com/jquery/jquery
- github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js
- github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
- github.com/jquery/jquery/commit/606b863edaff29035960e4d813b45d63b8d92876
- github.com/rails/jquery-rails/blob/master/CHANGELOG.md
- github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js
- github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-7656.yml
- nvd.nist.gov/vuln/detail/CVE-2020-7656
- security.netapp.com/advisory/ntap-20200528-0001
- snyk.io/vuln/SNYK-JS-JQUERY-569619
- supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
- www.oracle.com/security-alerts/cpujul2022.html
Detect and mitigate CVE-2020-7656 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →