4.3
CVSSv2

CVE-2020-11022

Published: 29/04/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 387
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

In jQuery versions greater than or equal to 1.2 and prior to 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jquery jquery

drupal drupal

debian debian linux 9.0

fedoraproject fedora 31

fedoraproject fedora 32

fedoraproject fedora 33

oracle weblogic server 12.1.3.0.0

oracle jdeveloper 11.1.1.9.0

oracle retail back office 14.1

oracle retail back office 14.0

oracle peoplesoft enterprise peopletools 8.56

oracle weblogic server 10.3.6.0.0

oracle communications webrtc session controller 7.2

oracle weblogic server 12.2.1.3.0

oracle agile product lifecycle management for process 6.2.0.0

oracle peoplesoft enterprise peopletools 8.57

oracle application testing suite 13.3.0.1

oracle retail returns management 14.0

oracle retail returns management 14.1

oracle jdeveloper 12.2.1.3.0

oracle policy automation connector for siebel 10.4.6

oracle financial services market risk measurement and management 8.0.6

oracle hospitality materials control 18.1

oracle banking digital experience 18.2

oracle banking digital experience 18.3

oracle banking digital experience 19.1

oracle banking digital experience 18.1

oracle weblogic server 12.2.1.4.0

oracle financial services hedge management and ifrs valuations

oracle financial services loan loss forecasting and provisioning

oracle financial services asset liability management 8.0.7

oracle financial services asset liability management 8.0.6

oracle financial services profitability management 8.0.7

oracle financial services profitability management 8.0.6

oracle financial services funds transfer pricing 8.0.7

oracle financial services funds transfer pricing 8.0.6

oracle financial services price creation and discovery 8.0.7

oracle peoplesoft enterprise peopletools 8.58

oracle financial services liquidity risk management 8.0.6

oracle financial services liquidity risk measurement and management 8.0.8

oracle financial services liquidity risk measurement and management 8.0.7

oracle financial services balance sheet planning 8.0.8

oracle weblogic server 14.1.1.0.0

oracle financial services analytical applications infrastructure

oracle retail customer management and segmentation foundation 19.0

oracle healthcare foundation 7.2.0

oracle healthcare foundation 7.2.1

oracle healthcare foundation 7.3.0

oracle healthcare foundation 7.1.1

oracle communications billing and revenue management 12.0.0.3.0

oracle communications billing and revenue management 7.5.0.23.0

oracle financial services data governance for us regulatory reporting

oracle hospitality simphony

oracle banking digital experience 19.2

oracle financial services basel regulatory capital internal ratings based approach

oracle insurance data foundation

oracle financial services price creation and discovery 8.0.6

oracle financial services profitability management 8.1.0

oracle banking digital experience 20.1

oracle policy automation

oracle financial services analytical applications reconciliation framework

oracle financial services loan loss forecasting and provisioning 8.1.0

oracle financial services basel regulatory capital internal ratings based approach 8.1.0

oracle siebel ui framework 20.8

oracle communications application session controller 3.8m0

oracle financial services institutional performance analytics 8.1.0

oracle communications diameter signaling router idih\\

oracle financial services institutional performance analytics 8.0.6

oracle financial services data foundation

oracle insurance insbridge rating and underwriting

oracle financial services liquidity risk measurement and management 8.1.0

oracle financial services institutional performance analytics 8.0.7

oracle financial services basel regulatory capital basic 8.1.0

oracle financial services regulatory reporting for us federal reserve

oracle financial services regulatory reporting for european banking authority

oracle policy automation for mobile devices

oracle insurance allocation manager for enterprise profitability 8.0.8

oracle insurance insbridge rating and underwriting 5.6.1.0

oracle hospitality simphony 18.1

oracle financial services data integration hub 8.0.6

oracle financial services data integration hub 8.1.0

oracle insurance accounting analyzer 8.0.9

oracle financial services basel regulatory capital basic

oracle financial services hedge management and ifrs valuations 8.1.0

oracle financial services analytical applications reconciliation framework 8.1.0

oracle insurance allocation manager for enterprise profitability 8.1.0

oracle hospitality simphony 18.2

oracle financial services asset liability management 8.1.0

oracle enterprise manager ops center 12.4.0.0

oracle enterprise session border controller 8.4

oracle financial services market risk measurement and management 8.0.8

oracle jdeveloper 12.2.1.4.0

oracle financial services funds transfer pricing 8.1.0

oracle financial services data integration hub 8.0.7

oracle communications services gatekeeper 7.0

oracle communications eagle application processor

oracle blockchain platform

oracle storagetek acsls 8.5.1

netapp snap creator framework -

netapp snapcenter -

netapp oncommand insight -

netapp oncommand system manager

netapp max data -

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h300e_firmware -

netapp h500e_firmware -

netapp h700e_firmware -

netapp h410s_firmware -

netapp h410c_firmware -

opensuse leap 15.1

opensuse leap 15.2

tenable log correlation engine

oracle agile product supplier collaboration for process 6.2.0.0

oracle hospitality simphony 19.1.0-19.1.2

oracle insurance data foundation 8.0.6-8.1.0

oracle banking digital experience

Vendor Advisories

Debian Bug report logs - #1007145 wordpress: WordPress 592 security and maintenance release Package: wordpress; Maintainer for wordpress is Craig Small <csmall@debianorg>; Source for wordpress is src:wordpress (PTS, buildd, popcon) Reported by: Craig Small <csmall@debianorg> Date: Sat, 12 Mar 2022 02:09:02 UTC S ...
Several vulnerabilities were discovered in Drupal, a fully-featured content management framework, which could result in an open redirect or cross-site scripting For the oldstable distribution (stretch), these problems have been fixed in version 752-2+deb9u10 We recommend that you upgrade your drupal7 packages For the detailed security status of ...
jQuery before 300 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed (CVE-2015-9251) In Bootstrap 3x before 340 and 4x-beta before 400-beta2, XSS is possible in the data-target attribute, a different vulnerability t ...
Synopsis Moderate: Red Hat OpenShift Service Mesh security update Type/Severity Security Advisory: Moderate Topic An update for jaeger, kiali, and servicemesh-grafana is now available for OpenShift Service Mesh 10Red Hat Product Security has rated this update as having a security impact of Moderate A Com ...
Synopsis Moderate: OpenShift Container Platform 311 security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 311219 is now available withupdates to packages and images that fix several bugs and add enhancementsRed Hat Product Security has rated this up ...
Synopsis Important: Red Hat Single Sign-On 762 for OpenShift image security and enhancement update Type/Severity Security Advisory: Important Topic A new image is available for Red Hat Single Sign-On 762, running on RedHat OpenShift Container Platform from the release of 311 up to the releaseof 4120Red Hat Product Security has rated t ...
Synopsis Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the idm:DL1 and idm:client modules is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of M ...
Synopsis Moderate: ipa security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for ipa is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CV ...
Synopsis Important: RHV Manager (ovirt-engine) [ovirt-452] bug fix and security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Updated ovirt-engine packages that fix several bugs and add various enhancements are ...
概述 Important: Red Hat Single Sign-On 762 security update on RHEL 8 类型/严重性 Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems 标题 New Red Hat Single Sign-On 762 packages are now available for Red Hat Enterprise Linux 8Red H ...
Synopsis Moderate: OpenShift Container Platform 461 image security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 46Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability S ...
Synopsis Important: Red Hat Single Sign-On 741 security update Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 74 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulne ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 749 Security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update is now available for Red Hat JBoss Enterprise Application Platform 74 for ...
Synopsis Important: RHV Manager (ovirt-engine) 44 security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic Updated ovirt-engine packages that fix several bugs and add various enhancements are now availableRed Hat Product Security has rated this update as having a security ...
Synopsis Moderate: Red Hat AMQ Interconnect 190 release and security update Type/Severity Security Advisory: Moderate Topic Red Hat AMQ Interconnect 190 release packages are available for A-MQ Interconnect on RHEL 6, 7, and 8Red Hat Product Security has rated this update as having a security impact of ...
Synopsis Important: Red Hat Single Sign-On 762 security update on RHEL 7 Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 762 packages are now available for Red Hat Enterprise Linux 7Red Hat ...
Synopsis Important: Red Hat Single Sign-On 762 security update on RHEL 9 Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 762 packages are now available for Red Hat Enterprise Linux 9Red Hat ...
Synopsis Important: Red Hat Single Sign-On 762 security update Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 76 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 749 Security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 74 Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Syste ...
Synopsis Moderate: pki-core:106 and pki-deps:106 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the pki-core:106 and pki-deps:106 modules is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a se ...
Synopsis Moderate: Red Hat Virtualization security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat Virtualization Engine 44Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability ...
Synopsis Moderate: security update - Red Hat Ansible Tower 374-1 - RHEL7 Container Type/Severity Security Advisory: Moderate Topic Red Hat Ansible Tower 374-1 - RHEL7 Container Description Fixed two jQuery vulnerabilities (CVE-2020-11022, CVE-2020-11023) Improved Ansible Tower's web se ...
Multiple vulnerabilities have been found in Hitachi Ops Center Common Services CVE-2019-20330, CVE-2020-7676, CVE-2020-8840, CVE-2020-11022, CVE-2020-11023, CVE-2020-11619, CVE-2020-13444, CVE-2020-13445, CVE-2020-13934, CVE-2020-13935 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
A potential security vulnerability has been identified for certain HP printers and MFPs In jQuery versions before 350, passing HTML from untrusted sources may execute untrusted code jQuery is a JavaScript library used to simplify website creation and execution It is open source software used in many available websites ...
A potential security vulnerability has been identified for certain HP printers and MFPs In jQuery versions before 350, passing HTML from untrusted sources may execute untrusted code jQuery is a JavaScript library used to simplify website creation and execution It is open source software used in many available websites ...
Nessus leverages third-party software to help provide underlying functionality One of the third-party components (jQuery) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled jQuery components to address the potent ...
Tenablesc leverages third-party software to help provide underlying functionality Two separate third-party components (jQuery and OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address ...
Nessus Network Monitor leverages third-party software to help provide underlying functionality One of the third-party components (jQuery) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled jQuery components to add ...
Tenable Log Correlation Engine leverages third-party software to help provide underlying functionality Two separate third-party components (OpenSSL, jQuery) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled Open ...

Exploits

jQuery version 12 suffers from a cross site scripting vulnerability ...

Github Repositories

Strings_Attached An online shop and lesson hub for guitarists Source code can be found here The live project can be viewed here Purpose of Project The aim of the project is to help users on their journey to musical proficency The website consists of a shop where instruments and accessories can be purchased, and subscriptions to music lesson videos can be signed up to Links

CVE Collection of jQuery XSS Payloads

CVE Sandbox :: jQuery CVE Collection of jQuery XSS Payloads Maintained by @therceman CVE Version Details CVE-2020-11023 >= 151 < 350 View on Snyk CVE-2020-11022 >= 151 < 350 View on Snyk CVE-2019-11358 >= 100 < 340 View on Snyk

Web application for Bagel Patch in Patchogue, NY

Bagel Patch Website Created & designed by Corey Schneider BS in Computer Science from the University of North Carolina at Charlotte Resume note - This is the first Ruby on Rails application I have created A live demo can be found at bagelpatchonrendercom/ A demo admin account can be logged into with the following credentials: bagelpatchonrenderc

Vulnearability Report of the New Jersey official site

https-njgov---CVE-2020-11022 Vulnearability Report of the New Jersey official site Potential XSS vulnerability in jQueryhtmlPrefilter and related methods Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (ie html(), append(), and others) may execute untrusted code RECOMMENDATION This problem is patched in j

A server for maintaining high-throughput sequencing QC data

AlmostSignificant WARNING This distribution includes a legacy version of jquery that is known to have vulnerabilities The original developers are not in a position to update the code to patch this so if you wish to use AlmostSignificant please apply and test the patch before running the code Dependency jquery Version >= 120 < 350 Upgrade to ~> 350

CVEcrystalyer CVE tool to help with getting CVE details needed for reporting Tool uses reitre-jshtml as input, it will parse all of the CVE-s and grab the details from NVD and print them in terminal for copy/paste /CVEcrystalyer -h -c NAME Single CVE | Multiple CVE-s separated with ',' -> -c CVE-XXX-XXXX,CV

Geolocation Playground

Geolocation Playground === A small test of geolaction APIs and a bit of map hacking Very old alpha quality playground just for fun Deprecated for now due to vulernable jquery GHSA ID: GHSA-gxr4-xjj5-5px2 CVE ID: CVE-2020-11022 GHSA-gxr4-xjj5-5px2 Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery�

jQuery-XSS-poc

jQuery XSS jQuery with XSS, Testing and Secure Version 修复了参考版本中9521和11290无法弹窗的问题,11974新增一个payload,可以验证一些之前11974无法验证的jQuery,并新增3个新的XSSpayload 使用时只需要修改开头<script>标签里的src即可 Bug list: #9521 #11290 #11974 #CVE-2020-11022/CVE-2020-11023 Test version: tes

JS_Encoder Description This is a basic example of javascript, I aim to make a basic javascript encoder/decoder for various types (after learning) This will not be best pratices/clean or safe code (as I'm still learning js basics) Goals Add URL Encode/Decode Add obsfucation (simple, minify) Add methods to help with js payload creation ScreenShot & Video (Click to

Little thing put together quickly to demonstrate this CVE

CVE-2020-11022 CVE-2020-11023 In jQuery versions greater than or equal to 12 and before 350, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (ie html(), append(), and others) may execute untrusted code This problem is patched in jQuery 350 In jQuery versions greater than or equal to 103 and before

A simple place to learn XSS

XSSPlayground A simple place to learn XSS Made for myself to learn and to help others (please do use!) Disclaimer This is a works in progress and will change over time Learn what you can! Updates 15/03/2021 - Added new layout, reworked xss 1,2,3 Screenshots Setup Host php Download the indexphp file Add to your /var/www/html folder Tip: Make a new folder called 'xss

jQuery — New Wave JavaScript This fork back-ports reported security vulnerabilities on jQuery 224 XSS CVE-2020-11022 XSS CVE-2020-11023 Prototype Polution CVE-2019-5428 XSS CVE-2017-16012 Contribution Guides In the spirit of open source software development, jQuery always encourages community code contribution To help you get started and before you jump into writ

patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428

This repository contains the patches for CVE-2020-11022 and CVE-2020-11023 which affect all jQuery versions prior 350, including the patches from DanielRuf/snyk-js-jquery-174006 These patches were generated with diff -u original patched > patchfile Apply the patches You can apply the patches with patch, git apply, patch-package and composer-patches Please consult th

Vulnearability Report of the New Jersey official site

https-njgov---CVE-2020-11022 Vulnearability Report of the New Jersey official site Potential XSS vulnerability in jQueryhtmlPrefilter and related methods Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (ie html(), append(), and others) may execute untrusted code RECOMMENDATION This problem is patched in j

References

CWE-79https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/https://jquery.com/upgrade-guide/3.5/https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77https://security.netapp.com/advisory/ntap-20200511-0006/https://www.drupal.org/sa-core-2020-002https://www.debian.org/security/2020/dsa-4693https://www.oracle.com/security-alerts/cpujul2020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.htmlhttps://security.gentoo.org/glsa/202007-03http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.htmlhttps://www.tenable.com/security/tns-2020-10https://www.tenable.com/security/tns-2020-11https://www.oracle.com/security-alerts/cpujan2021.htmlhttps://www.tenable.com/security/tns-2021-02https://lists.debian.org/debian-lts-announce/2021/03/msg00033.htmlhttp://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.htmlhttps://www.tenable.com/security/tns-2021-10https://www.oracle.com/security-alerts/cpuApr2021.htmlhttps://www.oracle.com//security-alerts/cpujul2021.htmlhttps://www.oracle.com/security-alerts/cpuoct2021.htmlhttps://www.oracle.com/security-alerts/cpujan2022.htmlhttps://www.oracle.com/security-alerts/cpuapr2022.htmlhttps://www.oracle.com/security-alerts/cpujul2022.htmlhttps://lists.debian.org/debian-lts-announce/2023/08/msg00040.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133%40%3Ccommits.airflow.apache.org%3Ehttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3Ehttps://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3Ehttps://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3Ehttps://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007145https://github.com/cve-sandbox/jqueryhttps://www.cisa.gov/uscert/ics/advisories/icsa-22-097-01https://www.debian.org/security/2020/dsa-4693