GHSA-4MV4-GMMF-Q382
Vulnerability from github – Published: 2020-08-31 22:42 – Updated: 2022-08-03 22:59
VLAI?
Summary
DataTable Vulnerable to Cross-Site Scripting
Details
Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php.
Recommendation
Update to a version greater than 1.10.8. A fix appears in version 1.10.10.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "datatables"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.10.10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "datatables/datatables"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.10.10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2015-6584"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2020-08-31T18:07:30Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php.\n\n\n## Recommendation\n\nUpdate to a version greater than 1.10.8. A [fix](https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d) appears in [version 1.10.10](https://github.com/DataTables/DataTablesSrc/commits/1.10.10?after=9780a3693572757d87bf70e48bd7555faf974f28+34\u0026branch=1.10.10\u0026qualified_name=refs%2Ftags%2F1.10.10).",
"id": "GHSA-4mv4-gmmf-q382",
"modified": "2022-08-03T22:59:15Z",
"published": "2020-08-31T22:42:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6584"
},
{
"type": "WEB",
"url": "https://github.com/DataTables/DataTables/issues/602"
},
{
"type": "WEB",
"url": "https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d"
},
{
"type": "PACKAGE",
"url": "https://github.com/DataTables/DataTables"
},
{
"type": "WEB",
"url": "https://github.com/DataTables/DataTablesSrc/commits/1.10.10?after=9780a3693572757d87bf70e48bd7555faf974f28+34\u0026branch=1.10.10\u0026qualified_name=refs%2Ftags%2F1.10.10"
},
{
"type": "WEB",
"url": "https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/5"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2015/Sep/37"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/536437/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/archive/1/536437/100/0/threaded"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "DataTable Vulnerable to Cross-Site Scripting"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…