未加星标

JQuery mobile vulnerability allows cross-site scripting, no fix soon

字体大小 | |
[前端(javascript) 所属分类 前端(javascript) | 发布者 店小二05 | 时间 2017 | 作者 红领巾 ] 0人收藏点击收藏

A jQuery foundation framework used on more than 150,000 sites has been revealed to have a vulnerability which could permit cross-site scripting (XSS) and allow users to be unintentionally redirected towards malicious or attack sites. Sites reported vulnerable include Facebook, Google, Baidu, YouTube and Yahoo.

The exploit takes advantage of the rash of ‘extendible’ web pages in recent years, which use jQuery to scroll the user directly into new content without apparently changing the page.

The initial comprehension of the vulnerability was observed by Google engineer Eduardo Vela, who had earlier observed that it is possible to bypass Content Security Policy (CSP) ‘nonces’ (tokens).

The exploit makes use of the jQuery framework’s location.hash mark-up, which facilitates the separation of a single scrolling web page by providing a destination which relates to a place within the document itself, rather than a completely different URL.

Effectively the vulnerability allows a site with open redirects enabled to have an ‘alien’ URL inserted into history.PushState which then allows the potentially malignant URL to get written into the HTML of the page itself using the innerHTML javascript command.

When Vela reported the weakness to the jQuery mobile development team, they confirmed the risk to users but also that no fix is likely to be forthcoming immediately, since a patch for this particular issue would break so many web-applications:

“The jQuery Mobile team explained that they consider the Open Redirect to be the vulnerability, and not their behavior of fetching and inlining, and that they wouldn’t want to make a change because that might break existing applications. This means that there won’t be a patch as far as I have been informed. The jQuery mobile team suggests to 403 all requests made from XHR that might result in a redirect.

“This means that every website that uses jQuery Mobile, and has any open redirect anywhere is vulnerable to XSS.”

According to the Qualys Blog, open redirects are most likely to be found at the most vulnerable point of a website’s security arrangements the login page. The investigation into the diffusion of the problem revealed that many websites either have not closed the loophole or contain errors in their sanitising process against the attack.

本文前端(javascript)相关术语:javascript是什么意思 javascript下载 javascript权威指南 javascript基础教程 javascript 正则表达式 javascript设计模式 javascript高级程序设计 精通javascript javascript教程

主题: jQueryHTMLJavaScriptFacebookJava
分页:12
转载请注明
本文标题:JQuery mobile vulnerability allows cross-site scripting, no fix soon
本站链接:http://www.codesec.net/view/533141.html
分享请点击:


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 前端(javascript) | 评论(0) | 阅读(27)