Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11358 PoC — jQuery 跨站脚本漏洞

Source
Associated Vulnerability
Title:jQuery 跨站脚本漏洞 (CVE-2019-11358)
Description:jQuery是美国John Resig个人开发者的一套开源、跨浏览器的JavaScript库。该库简化了HTML与JavaScript之间的操作,并具有模块化、插件扩展等特点。 jQuery 3.4.0之前版本中存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
A fix for CVE-2019-11358 (prototype pollution in jquery)
Readme
# jquery-prototype-pollution-fix
A fix for CVE-2019-11358 (prototype pollution in jquery)

Simply download and include **jquery-1.12.2-patched.js** into your project instead of the original 1.12.2 version.

See test folder for examples how to check for the vulnerability
File Snapshot

[4.0K] /data/pocs/16ca9a8f74056823c96c987738ed17a2620402a9 ├── [287K] jquery-1.12.2-patched.js ├── [ 271] README.md └── [4.0K] test ├── [ 218] jquery-latest-test.html ├── [ 208] jquery-not-latest-test.html ├── [ 208] jquery-not-latest-test-patched.html └── [ 448] test.js 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.