The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of jQuery Core: Cross Site Scripting via HtmlPrefilter Regex

Synthesis of the vulnerability 

An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site.
Impacted products: Business Objects, Cacti, Debian, Drupal Core, BIG-IP Hardware, TMOS, Fedora, FreeIPA, IBM API Connect, Joomla! Core, jQuery Core, Nodejs Modules ~ not comprehensive, openSUSE Leap, Oracle Communications, Solaris, SAP CRM, SAP ERP, NetWeaver, SUSE Linux Enterprise Desktop, SLES, ASE, Telerik.Web.UI, Nessus.
Severity of this bulletin: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 14/04/2020.
Références of this threat: 20200601, 20200602, 20200603, 20200604, 20200605, 6217392, 6253319, CERTFR-2020-AVI-310, CERTFR-2020-AVI-335, cpujul2020, CVE-2020-11022, CVE-2020-11023, DRUPAL-SA-CORE-2020-002, DRUPAL-SA-CORE-2020-003, DSA-4693-1, FEDORA-2020-0b32a59b54, FEDORA-2020-11be4b36d4, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, FEDORA-2020-fbb94073a1, K02453220, K66544153, NPM-1518, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, VIGILANCE-VUL-32007.

Description of the vulnerability 

An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as Business Objects, Cacti, Debian, Drupal Core, BIG-IP Hardware, TMOS, Fedora, FreeIPA, IBM API Connect, Joomla! Core, jQuery Core, Nodejs Modules ~ not comprehensive, openSUSE Leap, Oracle Communications, Solaris, SAP CRM, SAP ERP, NetWeaver, SUSE Linux Enterprise Desktop, SLES, ASE, Telerik.Web.UI, Nessus.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a specialist ability can exploit this computer threat bulletin.

Solutions for this threat 

jQuery Core: version 3.5.0.
The version 3.5.0 is fixed:
  http://jquery.com/download/

Cacti: version 1.2.13.
The version 1.2.13 is fixed:
  https://github.com/cacti/

Debian 9: new drupal7 packages.
New packages are available:
  Debian 9: drupal7 7.52-2+deb9u10

Drupal Core: version 7.70.
The version 7.70 is fixed:
  https://www.drupal.org/project/drupal

Drupal Core: version 8.7.14.
The version 8.7.14 is fixed:
  https://www.drupal.org/project/drupal

Drupal Core: version 8.8.6.
The version 8.8.6 is fixed:
  https://www.drupal.org/project/drupal

F5 BIG-IP: solution for jQuery CVE-2020-11022.
The solution is indicated in information sources.

F5 BIG-IP: solution for jQuery CVE-2020-11023.
The solution is indicated in information sources.

Fedora 31-32: new cacti packages.
New packages are available:
  Fedora 31: cacti 1.2.13-1.fc31
  Fedora 32: cacti 1.2.13-1.fc32

Fedora 31-32: new drupal7 packages.
New packages are available:
  Fedora 31: drupal7 7.72-1.fc31
  Fedora 32: drupal7 7.72-1.fc32

Fedora 32: new drupal7 packages.
New packages are available:
  Fedora 32: drupal7 7.70-1.fc32

FreeIPA: version 4.8.7.
The version 4.8.7 is fixed:
  https://www.freeipa.org/page/Releases/4.8.7
  https://www.freeipa.org/page/Downloads

IBM API Connect: fixed versions for jQuery.
Fixed versions are indicated in information sources.

IBM API Connect: patch for Drupal.
A patch is indicated in information sources.

Joomla Core: version 3.9.19.
The version 3.9.19 is fixed:
  https://downloads.joomla.org/

Nessus: version 8.11.1.
The version 8.11.1 is fixed:
  https://www.tenable.com/

openSUSE, SUSE LE: new cacti packages.
New packages are available:
  openSUSE Leap 15.1: cacti 1.2.13-lp151.3.12.1
  openSUSE Leap 15.2: cacti 1.2.13-lp152.2.3.1
  SUSE LE 12 RTM-SP5: cacti 1.2.13-11.1

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

Oracle Solaris: patch for third party software of July 2020 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

SAP: solution of August 2020.
The solution is available on the SAP site:
  https://support.sap.com/kb-incidents/notifications/security-notes.html

SAP: solution of September 2020.
The solution is available on the SAP site:
  https://support.sap.com/kb-incidents/notifications/security-notes.html

SUSE LE 15 SP1: new cacti packages.
New packages are available:
  SUSE LE 15 SP1: cacti 1.2.13-bp151.4.12.1

Telerik UI for ASP.NET AJAX: version 2020.2.512.
The version 2020.2.512 is fixed:
  https://www.telerik.com/support/whats-new/release-history
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an application vulnerability announce. The Vigil@nce vulnerability database contains several thousand vulnerabilities.