CVE-2020-11022
ADVISORY - githubSummary
Impact
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html()
, .append()
, and others) may execute untrusted code.
Patches
This problem is patched in jQuery 3.5.0.
Workarounds
To workaround the issue without upgrading, adding the following to your code:
jQuery.htmlPrefilter = function( html ) {
return html;
};
You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround.
References
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/
For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery repo. If you don't find an answer, open a new issue.
Common Weakness Enumeration (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
NIST
1.6
CVSS SCORE
6.9mediumGitHub
1.6
CVSS SCORE
6.9mediumAlpine
-
Debian
-
Ubuntu
2.8
CVSS SCORE
6.1lowAlma
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumBitnami
BIT-2020-11022
-
CVSS SCORE
N/AmediumBitnami
BIT-drupal-2020-11022
2.8
CVSS SCORE
6.1mediumRed Hat
2.8
CVSS SCORE
6.1mediumRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AhighintheWild
-
-