Lucene search

K
githubGitHub Advisory DatabaseGHSA-536Q-8GXX-M782
HistorySep 11, 2019 - 11:02 p.m.

Cross-Site Scripting in dojo

2019-09-1123:02:57
CWE-79
GitHub Advisory Database
github.com
83

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.036

Percentile

91.8%

Versions of dojo prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the _testCommon.js and runner.html test files, allowing attackers to execute arbitrary JavaScript in the victim’s browser.

Recommendation

Upgrade to version 1.4.2 or later.

Affected configurations

Vulners
Node
dojodojoRange1.10.01.10.10
OR
dojodojoRange1.11.01.11.6
OR
dojodojoRange1.12.01.12.4
OR
dojodojoMatch1.13.0
VendorProductVersionCPE
dojodojo*cpe:2.3:a:dojo:dojo:*:*:*:*:*:*:*:*
dojodojo1.13.0cpe:2.3:a:dojo:dojo:1.13.0:*:*:*:*:*:*:*

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.036

Percentile

91.8%