The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of jQuery Core: Cross Site Scripting via HtmlPrefilter Regex

Synthesis of the vulnerability 

An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site.
Impacted products: Business Objects, Cacti, Debian, Drupal Core, PowerPath, BIG-IP Hardware, TMOS, Fedora, FreeIPA, LoadRunner, IBM API Connect, QRadar SIEM, Tivoli Storage Manager, Joomla! Core, jQuery Core, Nodejs Modules ~ not comprehensive, openSUSE Leap, Oracle Communications, Oracle DB, Oracle Fusion Middleware, Oracle Identity Management, Oracle OIT, Solaris, WebLogic, OTRS Help Desk, RHEL, SAP CRM, SAP ERP, NetWeaver, SUSE Linux Enterprise Desktop, SLES, ASE, Telerik.Web.UI, Nessus.
Severity of this bulletin: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 14/04/2020.
Références of this threat: 20200601, 20200602, 20200603, 20200604, 20200605, 6217392, 6253319, 6344075, 6367943, CERTFR-2020-AVI-310, CERTFR-2020-AVI-335, cpujul2020, cpuoct2020, CVE-2020-11022, CVE-2020-11023, DRUPAL-SA-CORE-2020-002, DRUPAL-SA-CORE-2020-003, DSA-2020-270, DSA-4693-1, FEDORA-2020-0b32a59b54, FEDORA-2020-11be4b36d4, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, FEDORA-2020-fbb94073a1, K02453220, K66544153, KM03758436, NPM-1518, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, openSUSE-SU-2020:1888-1, OSA-2020-14, RHSA-2020:3936-01, RHSA-2020:4670-01, RHSA-2020:4847-01, VIGILANCE-VUL-32007.

Description of the vulnerability 

An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as Business Objects, Cacti, Debian, Drupal Core, PowerPath, BIG-IP Hardware, TMOS, Fedora, FreeIPA, LoadRunner, IBM API Connect, QRadar SIEM, Tivoli Storage Manager, Joomla! Core, jQuery Core, Nodejs Modules ~ not comprehensive, openSUSE Leap, Oracle Communications, Oracle DB, Oracle Fusion Middleware, Oracle Identity Management, Oracle OIT, Solaris, WebLogic, OTRS Help Desk, RHEL, SAP CRM, SAP ERP, NetWeaver, SUSE Linux Enterprise Desktop, SLES, ASE, Telerik.Web.UI, Nessus.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a specialist ability can exploit this computer threat bulletin.

Solutions for this threat 

jQuery Core: version 3.5.0.
The version 3.5.0 is fixed:
  http://jquery.com/download/

Cacti: version 1.2.13.
The version 1.2.13 is fixed:
  https://github.com/cacti/

Debian 9: new drupal7 packages.
New packages are available:
  Debian 9: drupal7 7.52-2+deb9u10

Dell EMC PowerPath Management Appliance: fixed versions for jQuery.
Fixed versions are indicated in information sources.

Drupal Core: version 7.70.
The version 7.70 is fixed:
  https://www.drupal.org/project/drupal

Drupal Core: version 8.7.14.
The version 8.7.14 is fixed:
  https://www.drupal.org/project/drupal

Drupal Core: version 8.8.6.
The version 8.8.6 is fixed:
  https://www.drupal.org/project/drupal

F5 BIG-IP: solution for jQuery CVE-2020-11022.
The solution is indicated in information sources.

F5 BIG-IP: solution for jQuery CVE-2020-11023.
The solution is indicated in information sources.

Fedora 31-32: new cacti packages.
New packages are available:
  Fedora 31: cacti 1.2.13-1.fc31
  Fedora 32: cacti 1.2.13-1.fc32

Fedora 31-32: new drupal7 packages.
New packages are available:
  Fedora 31: drupal7 7.72-1.fc31
  Fedora 32: drupal7 7.72-1.fc32

Fedora 32: new drupal7 packages.
New packages are available:
  Fedora 32: drupal7 7.70-1.fc32

FreeIPA: version 4.8.7.
The version 4.8.7 is fixed:
  https://www.freeipa.org/page/Releases/4.8.7
  https://www.freeipa.org/page/Downloads

IBM API Connect: fixed versions for jQuery.
Fixed versions are indicated in information sources.

IBM API Connect: patch for Drupal.
A patch is indicated in information sources.

IBM QRadar SIEM: patch for Components.
A patch is indicated in information sources.

IBM Spectrum Protect Plus Linux: fixed versions for Dependencies.
Fixed versions are indicated in information sources.

Joomla Core: version 3.9.19.
The version 3.9.19 is fixed:
  https://downloads.joomla.org/

Micro Focus LoadRunner: version 2020 SP3.
The version 2020 SP3 is fixed:
  https://entitlement.microfocus.com/

Nessus: version 8.11.1.
The version 8.11.1 is fixed:
  https://www.tenable.com/

Nessus: version 8.13.0.
The version 8.13.0 is fixed:
  https://www.tenable.com/

openSUSE Leap, SUSE LE: new otrs packages.
New packages are available:
  openSUSE Leap 15.1: otrs 6.0.30-lp151.2.9.1
  openSUSE Leap 15.2: otrs 6.0.30-lp152.2.6.1
  SUSE LE 15 SP1: otrs 6.0.30-bp151.3.9.1
  SUSE LE 15 SP2: otrs 6.0.30-bp152.2.11.1

openSUSE, SUSE LE: new cacti packages.
New packages are available:
  openSUSE Leap 15.1: cacti 1.2.13-lp151.3.12.1
  openSUSE Leap 15.2: cacti 1.2.13-lp152.2.3.1
  SUSE LE 12 RTM-SP5: cacti 1.2.13-11.1

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

Oracle Communications: CPU of October 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2714788.1
  https://support.oracle.com/rs?type=doc&id=2713777.1
  https://support.oracle.com/rs?type=doc&id=2714789.1
  https://support.oracle.com/rs?type=doc&id=2714787.1
  https://support.oracle.com/rs?type=doc&id=2714763.1
  https://support.oracle.com/rs?type=doc&id=2714792.1
  https://support.oracle.com/rs?type=doc&id=2713779.1
  https://support.oracle.com/rs?type=doc&id=2713303.1
  https://support.oracle.com/rs?type=doc&id=2714790.1
  https://support.oracle.com/rs?type=doc&id=2712893.1
  https://support.oracle.com/rs?type=doc&id=2714764.1
  https://support.oracle.com/rs?type=doc&id=2714796.1
  https://support.oracle.com/rs?type=doc&id=2714988.1
  https://support.oracle.com/rs?type=doc&id=2714791.1

Oracle Database: CPU of October 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2694898.1

Oracle Fusion Middleware: CPU of October 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2694898.1

Oracle Solaris: patch for third party software of July 2020 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

OTRS: version 6.0.30.
The version 6.0.30 is fixed:
  https://otrs.com/

OTRS: version 7.0.22.
The version 7.0.22 is fixed:
  https://otrs.com/

OTRS: version 8.0.7.
The version 8.0.7 is fixed:
  https://otrs.com/

RHEL 7.8: new ipa packages.
New packages are available:
  RHEL 7.0-7.8: ipa 4.6.8-5.el7

RHEL 8: new idm-DL1 module.
The following module is updated:
  RHEL 8 Module: idm:DL1

RHEL 8: new pki-core-10.6 module.
The following module is updated:
  RHEL 8 Module: pki-core:10.6

SAP: solution of August 2020.
The solution is available on the SAP site:
  https://support.sap.com/kb-incidents/notifications/security-notes.html

SAP: solution of September 2020.
The solution is available on the SAP site:
  https://support.sap.com/kb-incidents/notifications/security-notes.html

SUSE LE 15 SP1: new cacti packages.
New packages are available:
  SUSE LE 15 SP1: cacti 1.2.13-bp151.4.12.1

Telerik UI for ASP.NET AJAX: version 2020.2.512.
The version 2020.2.512 is fixed:
  https://www.telerik.com/support/whats-new/release-history
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an application vulnerability announce. The Vigil@nce vulnerability database contains several thousand vulnerabilities.