Miggo Logo

CVE-2020-11022:
Potential XSS Vulnerability in jQuery DOM Manipulation Methods

6.9

CVSS Score
3.1

Basic Information

EPSS Score
0.8508%
Published
4/29/2020
Updated
1/31/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
jquerynpm>= 1.2.0, < 3.5.03.5.0
jquerynuget>= 1.2.0, < 3.5.03.5.0
org.webjars.npm:jquerymaven>= 1.2.0, < 3.5.03.5.0
jquery-railsrubygems< 4.4.04.4.0
maximebf/debugbarcomposer< 1.19.01.19.0
athlon1600/youtube-downloadercomposer<= 4.0.0
components/jquerycomposer>= 1.2.0, < 3.5.03.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focused on the changes made to the jQuery.htmlPrefilter function, which was identified as the source of the vulnerability. The commit information and patch files provided the necessary evidence to determine the vulnerable function and its location.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t P*ssin* *TML *rom untrust** sour**s - *v*n **t*r s*nitizin* it - to on* o* jQu*ry's *OM m*nipul*tion m*t*o*s (i.*. `.*tml()`, `.*pp*n*()`, *n* ot**rs) m*y *x**ut* untrust** *o**. ### P*t***s T*is pro*l*m is p*t**** in jQu*ry *.*.*. ### W

Reasoning

T** *n*lysis *o*us** on t** ***n**s m*** to t** `jQu*ry.*tmlPr**ilt*r` *un*tion, w*i** w*s i**nti*i** *s t** sour** o* t** vuln*r**ility. T** *ommit in*orm*tion *n* p*t** *il*s provi*** t** n***ss*ry *vi**n** to **t*rmin* t** vuln*r**l* *un*tion *n*