jQuery 跨站脚本漏洞
CNNVD-ID编号 | CNNVD-202004-2429 | CVE编号 | CVE-2020-11022 |
发布时间 | 2020-04-29 | 更新时间 | 2021-01-27 |
漏洞类型 | 跨站脚本 | 漏洞来源 | N/A |
危险等级 | 中危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
jQuery是美国John Resig个人开发者的一套开源、跨浏览器的JavaScript库。该库简化了HTML与JavaScript之间的操作,并具有模块化、插件扩展等特点。
jQuery 1.2版本至3.5.0之前版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
漏洞补丁
目前厂商已发布升级了jQuery 跨站脚本漏洞的补丁,jQuery 跨站脚本漏洞的补丁获取链接:
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
参考网址
来源:FEDORA
来源:MISC
链接:https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
来源:FEDORA
来源:MLIST
来源:GENTOO
链接:https://security.gentoo.org/glsa/202007-03
来源:CONFIRM
链接:https://www.drupal.org/sa-core-2020-002
来源:MISC
链接:https://jquery.com/upgrade-guide/3.5/
来源:MLIST
来源:FEDORA
来源:MLIST
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200511-0006/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:CONFIRM
链接:https://www.tenable.com/security/tns-2020-10
来源:CONFIRM
链接:https://www.tenable.com/security/tns-2020-11
来源:FEDORA
来源:CONFIRM
链接:https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4693
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
来源:MLIST
来源:FEDORA
来源:MISC
链接:https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159513/Red-Hat-Security-Advisory-2020-4211-01.html
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4248/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2287/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2966/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159275/Red-Hat-Security-Advisory-2020-3807-01.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-11022
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157905/Red-Hat-Security-Advisory-2020-2362-01.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48898
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1880/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3875/
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158555/Gentoo-Linux-Security-Advisory-202007-03.html
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2694/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158282/Red-Hat-Security-Advisory-2020-2813-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2375/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2775/
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1804/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1925/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160274/Red-Hat-Security-Advisory-2020-5249-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1961/
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159353/Red-Hat-Security-Advisory-2020-3936-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3028/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157850/Red-Hat-Security-Advisory-2020-2217-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158750/Red-Hat-Security-Advisory-2020-3247-01.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158406/Red-Hat-Security-Advisory-2020-2412-01.html
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2660.3/
来源:www.ibm.com
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1863/
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3700/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3902/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159852/Red-Hat-Security-Advisory-2020-4847-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2660/
来源:www.ibm.com
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3255/
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3368/
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202004-2429

评论