Miggo Logo

GHSA-jmh9-6rjq-gjh9:
Vulnerable embedded jQuery Version

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
6/5/2024
Updated
6/5/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/admin-ui-classic-bundlecomposer<= 1.4.21.4.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using jQuery 3.4.1, which contains XSS vulnerabilities in DOM manipulation methods like .html() and .append() when processing untrusted HTML. However, the provided information does not include specific code examples, file paths, or namespace details from the pimcore/admin-ui-classic-bundle implementation that directly utilize these jQuery methods with untrusted input. While the jQuery methods themselves are known to be vulnerable, the advisory focuses on the library version rather than specific vulnerable functions in the PIMCore codebase. Without access to the actual implementation details or commit diffs, we cannot confidently identify specific application-level functions that trigger the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry PIM*or* us*s t** J*v*S*ript li*r*ry jQu*ry in v*rsion *.*.*. T*is v*rsion is vuln*r**l* to *ross-sit*-s*riptin* (XSS). ### **t*ils In jQu*ry v*rsions *r**t*r t**n or *qu*l to *.*.* *n* ***or* *.*.*, p*ssin* *TML *ont*inin* *l*m*nts *rom

Reasoning

T** vuln*r**ility st*ms *rom usin* `jQu*ry` *.*.*, w*i** *ont*ins XSS vuln*r**iliti*s in *OM m*nipul*tion m*t*o*s lik* `.*tml()` *n* `.*pp*n*()` w**n pro**ssin* untrust** *TML. *ow*v*r, t** provi*** in*orm*tion *o*s not in*lu** sp**i*i* *o** *x*mpl*s