Cross-site Request Forgery (CSRF) Affecting org.webjars.npm:jquery-ujs package, versions [,1.0.4)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.62% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-575702
  • published24 Jun 2015
  • disclosed24 Jun 2015
  • creditBen Toews of GitHub

Introduced: 24 Jun 2015

CVE-2015-1840  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade org.webjars.npm:jquery-ujs to version 1.0.4 or higher.

Overview

org.webjars.npm:jquery-ujs is an Unobtrusive scripting adapter for jQuery

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). It can be used to bypass CSP protections and allows attackers to send CSRF tokens to attacker domains. In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to " https://attacker.com" (note the leading space) that will be passed to JQuery, who will see this as a same origin request, and send the user's CSRF token to the attacker domain.

CVSS Scores

version 3.1