brocaar / chirpstack-application-server

ChirpStack Application Server is an open-source LoRaWAN application-server.
https://www.chirpstack.io
MIT License
502 stars 326 forks source link

Vulnerability from outdated jquery bundled with swagger #543

Open enzokwai opened 4 years ago

enzokwai commented 4 years ago

What happened?

From web vulnerability scanning, we found in /api swagger include a outdated jquery (1.8.0), which subject to follow vulnerabilities

https://github.com/brocaar/chirpstack-application-server/blob/d7ac98997fe36cd6c6090b2cb84a6dafc60ee79f/static/swagger/index.html#L13

jQuery Vulnerability: CVE-2012-6708 (jquery-cve-2012-6708) jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

jQuery Vulnerability: CVE-2014-6071 (jquery-cve-2014-6071) jQuery 1.4.2 allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to use of the text method inside after. Fixed in 1.11

jQuery Vulnerability: CVE-2020-7656 (jquery-cve-2020-7656) jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "", which results in the enclosed script logic to be executed.

brocaar commented 3 years ago

Would you mind creating a pull-request?