Miggo Logo

CVE-2019-11358:
eZ Platform Bundled jQuery Affected by Object.prototype Pollution Vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.85606%
Published
4/26/2019
Updated
11/5/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
jquery-railsrubygems< 4.3.44.3.4
djangopip>= 2.0a1, < 2.1.92.1.9
djangopip>= 2.2a1, < 2.2.22.2.2
jquerynpm>= 1.1.4, < 3.4.03.4.0
jQuerynuget>= 1.1.4, < 3.4.03.4.0
org.webjars.npm:jquerymaven>= 1.1.4, < 3.4.03.4.0
maximebf/debugbarcomposer< 1.19.01.19.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focused on the provided GitHub patch information for the jQuery repository. The patch modifies the jQuery.extend function to prevent Object.prototype pollution by checking if the property name is 'proto' and skipping it if so. This indicates that jQuery.extend is the vulnerable function. The change is directly related to the CVE-2019-11358 vulnerability described in the task.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

jQu*ry *rom *.*.* until *.*.*, *s us** in *rup*l, ***k*rop *MS, *n* ot**r pro*u*ts, mis**n*l*s `jQu*ry.*xt*n*(tru*, {}, ...)` ****us* o* `O*j**t.prototyp*` pollution. I* *n uns*nitiz** sour** o*j**t *ont*in** *n *num*r**l* `__proto__` prop*rty, it *o

Reasoning

T** *n*lysis *o*us** on t** provi*** *it*u* p*t** in*orm*tion *or t** jQu*ry r*pository. T** p*t** mo*i*i*s t** jQu*ry.*xt*n* *un*tion to pr*v*nt O*j**t.prototyp* pollution *y ****kin* i* t** prop*rty n*m* is '__proto__' *n* skippin* it i* so. T*is i