CVE-2015-9251 (Medium) detected in jquery-1.6.4rc1
Closed this issue · 0 comments
CVE-2015-9251 - Medium Severity Vulnerability
Vulnerable Library - jquery1.6.4rc1
jQuery JavaScript Library
Library home page: https://github.com/jquery/jquery.git
Found in HEAD commit: cb1616e699f4ab2cb38b908f85d85549fba56f72
Library Source Files (38)
* The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/event.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/dimensions.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/css.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/core.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/attributes.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/ajax/xhr.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/traversing.js
- /informix-text-exporter/node_modules/jq/support/jquery/speed/jquery-basis.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/queue.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/csp.php
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/dimensions.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/offset.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/traversing.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/readywaitloader.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/support.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/ajax/jsonp.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/../src/effects.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/deferred.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/offset/../../../src/core.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/ajax/script.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/deferred.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/support.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/testinit.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/testrunner.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/../src/queue.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/../src/attributes.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/ajax.js
- /informix-text-exporter/node_modules/jq/support/jquery/speed/benchmarker.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/offset/../../../src/data.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/offset/../../../src/offset.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/../src/event.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/effects.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/manipulation.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/../src/manipulation.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/unit/data.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/polluted.php
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/ajax.js
- /informix-text-exporter/node_modules/jq/support/jquery/test/data/support/../../../src/css.js
Vulnerability Details
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Publish Date: 2018-01-18
URL: CVE-2015-9251
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-9251
Release Date: 2018-01-18
Fix Resolution: jQuery - v3.0.0
Step up your Open Source Security Game with WhiteSource here