In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 - Medium Severity Vulnerability
simplesamlphp/simplesamlphp-v1.18.7
A PHP implementation of a SAML 2.0 service provider and identity provider, also compatible with Shibboleth 1.3 and 2.0.
Library home page: https://api.github.com/repos/simplesamlphp/simplesamlphp/zipball/c62e32c807d50ada1fd6f4792e2054a0471100ad
Dependency Hierarchy: - :x: **simplesamlphp/simplesamlphp-v1.18.7** (Vulnerable Library)
simplesamlphp/simplesamlphp-module-discopower-v0.9.3
Fancy tabbed discovery service with filtering capabilities where SPs can have different sets of metadata listed
Library home page: https://api.github.com/repos/simplesamlphp/simplesamlphp-module-discopower/zipball/c892926e8186d0a2c638f7032dfc30540c1f92fb
Dependency Hierarchy: - simplesamlphp/simplesamlphp-v1.18.7 (Root Library) - :x: **simplesamlphp/simplesamlphp-module-discopower-v0.9.3** (Vulnerable Library)
simplesamlphp/simplesamlphp-module-oauth-v0.9.2
A SimpleSAMLphp module that allows integration with OAuth1,
Library home page: https://api.github.com/repos/simplesamlphp/simplesamlphp-module-oauth/zipball/d14d7aca6e699ec12b3f4dd0128373faa1a2cc61
Dependency Hierarchy: - simplesamlphp/simplesamlphp-v1.18.7 (Root Library) - simplesamlphp/simplesamlphp-module-authtwitter-v0.9.1 - :x: **simplesamlphp/simplesamlphp-module-oauth-v0.9.2** (Vulnerable Library)
simplesamlphp/simplesamlphp-module-statistics-v0.9.4
The SimpleSAMLphp statistics module
Library home page: https://api.github.com/repos/simplesamlphp/simplesamlphp-module-statistics/zipball/1bb1e46921d8dc84707bc9cd3c307c8abd723ac7
Dependency Hierarchy: - simplesamlphp/simplesamlphp-v1.18.7 (Root Library) - :x: **simplesamlphp/simplesamlphp-module-statistics-v0.9.4** (Vulnerable Library)
Found in HEAD commit: a9a6ea56561fe388debc15645b563aba771437b4
Found in base branch: develop
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11022
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
Release Date: 2020-04-29
Fix Resolution: jQuery - 3.5.0
Step up your Open Source Security Game with WhiteSource here