Cross-site Scripting (XSS) Affecting dojo package, versions >=1.0.0 <1.0.3>=1.1.0 <1.1.2>=1.2.0 <1.2.4>=1.3.0 <1.3.3>=1.4.0 <1.4.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
3.57% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-DOJO-174934
  • published7 Jun 2019
  • disclosed16 May 2010
  • creditbix

Introduced: 16 May 2010

CVE-2010-2273  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade dojo to version 1.0.3, 1.1.2, 1.2.4, 1.3.3, 1.4.2 or higher.

Overview

dojo is a foundation package for the Dojo 1 Toolkit. While still being maintained, new development is primarily focused on modern Dojo.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Multiple cross-site scripting (XSS) vulnerabilities in Dojo allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to:

  • dojo/resources/iframe_history.html
  • 'dojox/av/FLAudio.js, dojox/av/FLVideo.js, dojox/av/resources/audio.swf'
  • 'dojox/av/resources/video.swf, util/buildscripts/jslib/build.js'
  • 'util/buildscripts/jslib/buildUtil.js'

as demonstrated by the (1) dojoUrl and (2) testUrl parameters to util/doh/runner.html.

Description

CVSS Scores

version 3.1