vulnerability
Red Hat JBoss EAP: CVE-2020-11023: Cross-site Scripting
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 29, 2020 | Sep 19, 2024 | Jul 9, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 29, 2020
Added
Sep 19, 2024
Modified
Jul 9, 2025
Description
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.. A flaw was found in jQuery. HTML containing \<option\> elements from untrusted sources are passed, even after sanitizing, to one of jQuery's DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-79
- CVE-2020-11023
- https://attackerkb.com/topics/CVE-2020-11023
- URL-https://access.redhat.com/security/cve/CVE-2020-11023
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1850004
- URL-https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
- URL-https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- URL-https://access.redhat.com/errata/RHSA-2023:0552
- URL-https://access.redhat.com/errata/RHSA-2023:0553
- URL-https://access.redhat.com/errata/RHSA-2023:0554
- URL-https://access.redhat.com/errata/RHSA-2023:0556
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.