Cross-site Scripting (XSS) Affecting org.webjars.npm:jquery package, versions [,1.12.2)[1.12.3 ,3.0.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.87% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-479783
  • published27 Nov 2016
  • disclosed26 Jun 2015
  • creditEgor Homakov

Introduced: 26 Jun 2015

CVE-2015-9251  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade org.webjars.npm:jquery to version 1.12.2, 3.0.0 or higher.

Overview

org.webjars.npm:jquery is a JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain ajax request is performed without the dataType option causing text/javascript responses to be executed.

Note: After being implemented in version 1.12.0, the fix of this vulnerability was reverted in 1.12.3, and then was only reintroduced in version 3.0.0-beta1. The fix was never released in any tag of the 2.x.x branch, as it was reverted out of the branch before being released.

Note: CVE-2017-16012 is a duplicate of CVE-2015-9251

Details

CVSS Scores

version 3.1