jQuery – CVE-2020-11023

Description

Cytrix has detected that the jQuery version being used is vulnerable to Execute Code Cross-Site Scripting.
That means that passing HTML from untrusted sources is enabled and could lead to undesirable results.

This vulnerability means, that HTML containing “< option >” elements being passed from untrusted sources could execute untrusted code.
Even if the HTML is being sanitized using “.html()”, “.append()” and others the untrusted code could potentially be executed.
This allows an attacker to modify some system files or information. Yet, the attacker does not have control over what can be modified, or very limited in terms of possibilities.

Severity/Score

CVSS Version 3.x – 6.1 Medium

Recommendation

Upgrade the version of the jquery you use.
Since it exists only in versions 1.0.3 through 3.5.0, make sure you upgrade to version 3.5.0 or higher.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023

https://cwe.mitre.org/data/definitions/79.html

< Return to all Vulnerabilities

Man-In-The-Middle Attacks

Do you know these people who just push themselves into conversations?That’s Man-In-The-Middle Attacks. And from a wider angle, Man-In-The-Middle Attacks, or MITM, are built around

Read More »

The Cloud

I’m pretty sure there isn’t a single adult in the world who hasn’t at least heard of The Cloud. Explaining “The Cloud” in 2022 may

Read More »