This security bulletin contains one medium risk vulnerability.
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within the load() function. A remote attacker can pass specially crafted HTML code to the application and execute it in browser in security context of the affected website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
<html> <head> <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.3/jquery.js"></script> </head> <body> <div id="mydiv"></div> <script> $("#mydiv").load('inject.html #himom'); </script> </body> </html>
<div id="himom"><script>alert('Arbitrary Code Execution');</script ></div>
Install update from vendor's website.Vulnerable software versions
jQuery: 1.0 - 1.8.3Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?