jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20200528-0001/ | Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-JQUERY-569619 | Exploit Third Party Advisory |
https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2020-05-19 21:15
Updated : 2023-06-22 19:49
NVD link : CVE-2020-7656
Mitre link : CVE-2020-7656
CVE.ORG link : CVE-2020-7656
JSON object : View
Products Affected
netapp
- cloud_backup
- active_iq_unified_manager
- oncommand_system_manager
- snap_creator_framework
juniper
- junos
jquery
- jquery
oracle
- peoplesoft_enterprise_peopletools
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')