CPANSA-Plack-Debugger-2020-11022-jquery: Plack-Debugger vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2020-04-29T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2020-04-29T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 6.9 Severity Medium
Original language Language en
Also referred to

Vulnerability Description

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Vulnerabilities

CVE-2020-11022

Vulnerability Description

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Weakness CWE-79 : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Known affected
Product Score
Plack-Debugger greater than or equal 0.01 and less than or equal 0.03
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N 6.9 Medium
2.0 AV:N/AC:M/Au:N/C:N/I:P/A:N 4.3 Medium

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Wed Apr 29 00:00:00 2020 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/