Skip to main content

jQuery XSS Vulnerability: A Cross-Site Scripting Threat

Introduction

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a known exploited vulnerability in the popular jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, identified as CVE-2020-11023, is a medium-severity cross-site scripting (XSS) bug that could be exploited to achieve arbitrary code execution.

Background

The vulnerability was addressed in jQuery version 3.5.0 released in April 2020. A workaround for CVE-2020-11023 involves using DOMPurify with the SAFE_FOR_JQUERY flag set to sanitize the HTML string before passing it to a jQuery method.

Exploitation

The vulnerability can be exploited by passing HTML containing

Threat Actors

Dutch security firm EclecticIQ revealed in February 2024 that the command-and-control (C2) addresses associated with a malicious campaign exploiting security flaws in Ivanti appliances ran a version of JQuery that was susceptible to at least one of the three flaws, CVE-2020-11023, CVE-2020-11022, and CVE-2019-11358.

Remediation

Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are recommended to remediate the identified flaw by February 13, 2025, to secure their networks against active threats.

Conclusion

The CISA advisory is lean on details about the specific nature of exploitation and the identity of threat actors weaponizing the shortcoming. However, it is essential for organizations to take immediate action to remediate the identified flaw and prevent potential attacks.

Additional Resources

Stay Informed

Follow us on Twitter and LinkedIn to read more exclusive content we post.


Source Link