jQuery – CVE-2020-11023

Description

Kayran has detected that the jQuery version being used is vulnerable to Execute Code Cross-Site Scripting.
That means that passing HTML from untrusted sources is enabled and could lead to undesirable results.

This vulnerability means, that HTML containing “< option >” elements being passed from untrusted sources could execute untrusted code.
Even if the HTML is being sanitized using “.html()”, “.append()” and others the untrusted code could potentially be executed.
This allows an attacker to modify some system files or information. Yet, the attacker does not have control over what can be modified, or very limited in terms of possibilities.

Recommendation

Upgrade the version of the jquery you use.
Since it exists only in versions 1.0.3 through 3.5.0, make sure you upgrade to version 3.5.0 or higher.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023

< Return to all Vulnerabilities

SQLI to RCE

How to preform SQLI TO RCE? One of the most interesting and important things about any site is the database. So, it’s important to protect

Read More »

Passwords 101

Unlike basketballs, “passwords” are things we don’t want to be passed around, especially in a society built around the idea that “mystery” is appealing. We

Read More »

HTTP VS. HTTPS

You must have once wondered what HTTP means and what is the difference between that ugly word to HTTPS, and if not, then please read

Read More »

Bug Bounties

As pirates, we all love plundering, we all love raiding, but mostly, we all love bounties, especially Bug Bounties. Let’s talk about it. Bug Bounties

Read More »