Skip to content

jquery-1.7.1.min.js: 4 vulnerabilities (highest severity is: 5.7) [master] #19

@mend-developer-platform-dev

Description

@mend-developer-platform-dev
📂 Vulnerable Library - jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to vulnerable library: /webapp/src/main/webapp/WEB-INF/view/scripts/jquery/jquery.min.js

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2020-11022 🟠 Medium 5.7 Proof of concept 22.8% jquery-1.7.1.min.js Direct jquery - 3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,org.webjars.npm:jquery:3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,jquery - 3.5.0,org.webjars.npm:jquery:3.5.0
CVE-2020-11023 🟠 Medium 5.7 Proof of concept 22.0% jquery-1.7.1.min.js Direct org.webjars.npm:jquery:3.5.0,jQuery - 3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,jQuery - 3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,org.webjars.npm:jquery:3.5.0
CVE-2012-6708 🟠 Medium 5.3 Not Defined < 1% jquery-1.7.1.min.js Direct jQuery - 1.9.0,jquery-rails - 2.2.0
CVE-2015-9251 🟠 Medium 5.3 High 11.3% jquery-1.7.1.min.js Direct org.webjars.npm:jquery:1.12.2,jquery-rails - 4.2.0,jQuery - 1.12.2,jquery - 1.12.2,jquery - 3.0.0,org.webjars.npm:jquery:3.0.0,jQuery - 3.0.0,jQuery - 1.12.2,org.webjars.npm:jquery:3.0.0,jquery - 1.12.2,jquery-rails - 4.2.0,jQuery - 3.0.0,org.webjars.npm:jquery:1.12.2,jquery - 3.0.0

Details

🟠CVE-2020-11022

Vulnerable Library - jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to vulnerable library: /webapp/src/main/webapp/WEB-INF/view/scripts/jquery/jquery.min.js

Dependency Hierarchy:

  • jquery-1.7.1.min.js (Vulnerable Library)

Vulnerability Details

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: Apr 29, 2020 12:00 AM

URL: CVE-2020-11022

Threat Assessment

Exploit Maturity:Proof of concept

EPSS:22.8%

Score: 5.7


Suggested Fix

Type: Upgrade version

Origin: GHSA-gxr4-xjj5-5px2

Release Date: Apr 29, 2020 12:00 AM

Fix Resolution : jquery - 3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,org.webjars.npm:jquery:3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,jquery - 3.5.0,org.webjars.npm:jquery:3.5.0

🟠CVE-2020-11023

Vulnerable Library - jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to vulnerable library: /webapp/src/main/webapp/WEB-INF/view/scripts/jquery/jquery.min.js

Dependency Hierarchy:

  • jquery-1.7.1.min.js (Vulnerable Library)

Vulnerability Details

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: Apr 29, 2020 12:00 AM

URL: CVE-2020-11023

Threat Assessment

Exploit Maturity:Proof of concept

EPSS:22.0%

Score: 5.7


Suggested Fix

Type: Upgrade version

Origin: GHSA-jpcq-cgw6-v4j6

Release Date: Apr 29, 2020 12:00 AM

Fix Resolution : org.webjars.npm:jquery:3.5.0,jQuery - 3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,jQuery - 3.5.0,jquery-rails - 4.4.0,jquery - 3.5.0,org.webjars.npm:jquery:3.5.0

🟠CVE-2012-6708

Vulnerable Library - jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to vulnerable library: /webapp/src/main/webapp/WEB-INF/view/scripts/jquery/jquery.min.js

Dependency Hierarchy:

  • jquery-1.7.1.min.js (Vulnerable Library)

Vulnerability Details

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
Mend Note:

Publish Date: Jan 18, 2018 11:00 PM

URL: CVE-2012-6708

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 5.3


Suggested Fix

Type: Upgrade version

Origin: GHSA-2pqj-h3vj-pqgw

Release Date: Jan 18, 2018 11:00 PM

Fix Resolution : jQuery - 1.9.0,jquery-rails - 2.2.0

🟠CVE-2015-9251

Vulnerable Library - jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to vulnerable library: /webapp/src/main/webapp/WEB-INF/view/scripts/jquery/jquery.min.js

Dependency Hierarchy:

  • jquery-1.7.1.min.js (Vulnerable Library)

Vulnerability Details

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Mend Note:

Publish Date: Jan 18, 2018 11:00 PM

URL: CVE-2015-9251

Threat Assessment

Exploit Maturity:High

EPSS:11.3%

Score: 5.3


Suggested Fix

Type: Upgrade version

Origin: GHSA-rmxg-73gg-4p98

Release Date: Jan 18, 2018 11:00 PM

Fix Resolution : org.webjars.npm:jquery:1.12.2,jquery-rails - 4.2.0,jQuery - 1.12.2,jquery - 1.12.2,jquery - 3.0.0,org.webjars.npm:jquery:3.0.0,jQuery - 3.0.0,jQuery - 1.12.2,org.webjars.npm:jquery:3.0.0,jquery - 1.12.2,jquery-rails - 4.2.0,jQuery - 3.0.0,org.webjars.npm:jquery:1.12.2,jquery - 3.0.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions