-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potential vulnerability in jQuery #5097
Comments
@mrgswift I realize that this is already public but I would prefer to have these reports come through privately first. We deal with all security reports very quickly so I prefer to discuss them back and forth over email before public issues are submitted when they may not be applicable. |
Understood. From now on anything related to security will be discussed privately. |
Thanks, I appreciate it! |
Fixed by 5c7ba9f, thanks for the report @mrgswift! @bennothommo is there a way we can tell GitHub what our JS dependencies are so that we can get notified when they release security advisories? |
@LukeTowers we have to define the specific versions we are running in the |
@bennothommo we should probably switch that to be more of a reporting feature than an actual package management file, i.e. specify the exact package versions we use |
@LukeTowers yep, agreed, as long as the tests still work. I'll take a look soon. |
@LukeTowers @bennothommo as I said in the past a few times, use this: https://snyk.io/ or https://github.com/apps/whitesource-bolt-for-github |
@ayumi-cloud GitHub has a tool for dependency vuln reporting built in, we just need to adjust our package.json to make it known to GitHub what dependencies we're using for JS. I believe it's on @bennothommo's todo list, but if you'd like to do it, go ahead! |
@LukeTowers I tried that out - the only (really minor) issue is that specifying all these dependencies is that when I was hoping to have |
Oh well, even just having them recorded centrally and being tracked by GitHub is an improvement. Is Yarn any better? I don't really know anything about JS package management |
@LukeTowers I think Yarn has the same limitation. It's no big deal, it just would've been a nice-to-have. |
Since this is already a public security advisory and a jQuery vulnerability, I am posting it as a public issue.
Summary:
CVE-2020-11022
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0
Problem:
The current stable version of OctoberCMS uses jQuery 3.4.0 which is vulnerable.
Solution:
The code-base should either be updated to support jQuery 3.5.0 or higher, or jQuery.htmlPrefilter should be overridden as a workaround - discussed here:
jQuery GitHub security advisory
From link above - workaround:
jQuery.htmlPrefilter = function( html ) { return html; };
The text was updated successfully, but these errors were encountered: