发布时间: 2024年8月22日
修改时间: 2024年8月22日
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
NVD | openEuler | |
---|---|---|
CVSS评分 | 6.1 | 6.1 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | Required | Required |
Scope | Changed | Changed |
Confidentiality | Low | Low |
Integrity | Low | Low |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-3411 | In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | 2024年8月22日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | js-jquery | Unaffected |
KY3.5.2 | js-jquery | Unaffected |
V6 | js-jquery | Unaffected |