CVE-2012-6708
Summary
| CVE | CVE-2012-6708 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-01-18 23:29:00 UTC |
| Updated | 2023-11-07 02:13:00 UTC |
| Description | jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cross-site Scripting (XSS) in jquery | Snyk | MISC | snyk.io | Patch, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| #11290 (selector interpreted as HTML) – jQuery Core - Bug Tracker | MISC | bugs.jquery.com | Exploit, Issue Tracking, Vendor Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| JQuery CVE-2012-6708 Cross Site Scripting Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| RetireJS CORS Issue / Script Execution ≈ Packet Storm | MISC | packetstormsecurity.com | |
| DCIM Support | CONFIRM | help.ecostruxureit.com | Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| [security-announce] openSUSE-SU-2020:0395-1: important: Recommended upda | SUSE | lists.opensuse.org | |
| Linksys EA7500 2.0.8.194281 Cross Site Scripting ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Adjust jQuery('html') detection to only match when html starts with '… · jquery/jquery@05531fc · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.