Title: CVE-2019-11358 (Medium) detected in jquery-1.9.1.jar · Issue #22 · jinhogate/JavaWebApplicationStepByStep · GitHub
Open Graph Title: CVE-2019-11358 (Medium) detected in jquery-1.9.1.jar · Issue #22 · jinhogate/JavaWebApplicationStepByStep
X Title: CVE-2019-11358 (Medium) detected in jquery-1.9.1.jar · Issue #22 · jinhogate/JavaWebApplicationStepByStep
Description: CVE-2019-11358 - Medium Severity Vulnerability Vulnerable Library - jquery-1.9.1.jar WebJar for jQuery Library home page: http://webjars.org Path to dependency file: /pom.xml Path to vulnerable library: /target/in28Minutes-first-webapp-0...
Open Graph Description: CVE-2019-11358 - Medium Severity Vulnerability Vulnerable Library - jquery-1.9.1.jar WebJar for jQuery Library home page: http://webjars.org Path to dependency file: /pom.xml Path to vulnerable lib...
X Description: CVE-2019-11358 - Medium Severity Vulnerability Vulnerable Library - jquery-1.9.1.jar WebJar for jQuery Library home page: http://webjars.org Path to dependency file: /pom.xml Path to vulnerable lib...
Opengraph URL: https://github.com/jinhogate/JavaWebApplicationStepByStep/issues/22
X: @github
Domain: patch-diff.githubusercontent.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2019-11358 (Medium) detected in jquery-1.9.1.jar","articleBody":"## CVE-2019-11358 - Medium Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ejquery-1.9.1.jar\u003c/b\u003e\u003c/summary\u003e\n\n\u003cp\u003eWebJar for jQuery\u003c/p\u003e\n\u003cp\u003eLibrary home page: \u003ca href=\"http://webjars.org\"\u003ehttp://webjars.org\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /pom.xml\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /target/in28Minutes-first-webapp-0.0.1-SNAPSHOT/WEB-INF/lib/jquery-1.9.1.jar,/jars/jquery/1.9.1/jquery-1.9.1.jar\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n - :x: **jquery-1.9.1.jar** (Vulnerable Library)\n\u003cp\u003eFound in base branch: \u003cb\u003emaster\u003c/b\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e \n \njQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.\n Mend Note: The description of this vulnerability differs from MITRE. \n\n\u003cp\u003ePublish Date: 2019-04-19\n\u003cp\u003eURL: \u003ca href=https://www.mend.io/vulnerability-database/CVE-2019-11358\u003eCVE-2019-11358\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 3 Score Details (\u003cb\u003e6.1\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics:\n- Exploitability Metrics:\n - Attack Vector: Network\n - Attack Complexity: Low\n - Privileges Required: None\n - User Interaction: Required\n - Scope: Changed\n- Impact Metrics:\n - Confidentiality Impact: Low\n - Integrity Impact: Low\n - Availability Impact: None\n\u003c/p\u003e\nFor more information on CVSS3 Scores, click \u003ca href=\"https://www.first.org/cvss/calculator/3.0\"\u003ehere\u003c/a\u003e.\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://github.com/advisories/GHSA-6c3j-c64m-qhgq\"\u003ehttps://github.com/advisories/GHSA-6c3j-c64m-qhgq\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2019-04-19\u003c/p\u003e\n\u003cp\u003eFix Resolution: jquery-rails - 4.3.4,django - 2.2.2,django - 2.1.9,org.webjars.npm:jquery:3.4.0,jQuery - 3.4.0,jquery - 3.4.0\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2024-03-13T20:15:31.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/22/JavaWebApplicationStepByStep/issues/22"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:8fc2ecf9-d0af-d448-df58-aeaf5d371493 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | CFBE:15AE57:F6C3B:162DD4:69787FF6 |
| html-safe-nonce | dcf9a11e7578286685e53646b01c3cdb89fde2f0d03441fee04316b1023ac6e7 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDRkJFOjE1QUU1NzpGNkMzQjoxNjJERDQ6Njk3ODdGRjYiLCJ2aXNpdG9yX2lkIjoiOTEyNDI0NTg5ODUzNDYxNzA3OCIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 881a9deee5c4b23b17f8fba8675ea6ba76ff6d0d7eded2a0d544062e71809f1f |
| hovercard-subject-tag | issue:2184813561 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/jinhogate/JavaWebApplicationStepByStep/22/issue_layout |
| twitter:image | https://opengraph.githubassets.com/59c4f9a2d9269f33f923e29531817c015ca3e0574b960c6d55471dfd246df442/jinhogate/JavaWebApplicationStepByStep/issues/22 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/59c4f9a2d9269f33f923e29531817c015ca3e0574b960c6d55471dfd246df442/jinhogate/JavaWebApplicationStepByStep/issues/22 |
| og:image:alt | CVE-2019-11358 - Medium Severity Vulnerability Vulnerable Library - jquery-1.9.1.jar WebJar for jQuery Library home page: http://webjars.org Path to dependency file: /pom.xml Path to vulnerable lib... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | mend-bolt-for-github[bot] |
| hostname | github.com |
| expected-hostname | github.com |
| None | 2981c597c945c1d90ac6fa355ce7929b2f413dfe7872ca5c435ee53a24a1de50 |
| turbo-cache-control | no-preview |
| go-import | github.com/jinhogate/JavaWebApplicationStepByStep git https://github.com/jinhogate/JavaWebApplicationStepByStep.git |
| octolytics-dimension-user_id | 43167955 |
| octolytics-dimension-user_login | jinhogate |
| octolytics-dimension-repository_id | 369470780 |
| octolytics-dimension-repository_nwo | jinhogate/JavaWebApplicationStepByStep |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 48418633 |
| octolytics-dimension-repository_parent_nwo | in28minutes/JavaWebApplicationStepByStep |
| octolytics-dimension-repository_network_root_id | 48418633 |
| octolytics-dimension-repository_network_root_nwo | in28minutes/JavaWebApplicationStepByStep |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 520b65a872113b919c1bbdb03834a50af15859fd |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width