|The Perils of jQuery?|
|Written by Ian Elliot|
|Thursday, 07 November 2019|
jQuery was downloaded more than 120 million times in the last 12 months, which is equivalent to the number of downloads for Vue.js (40 million) and Bootstrap (79 million) combined.
Snyk reports that four vulnerabilities had been found for Vue.js, all of which have been fixed. Bootstrap contained seven cross-site scripting (XSS) vulnerabilities. Three of these were disclosed in 2019 and there are no security fixes or upgrade paths to avoid them. In the case of jQuery snyk tracked six security vulnerabilities affecting jQuery across all of its releases to date. Four are medium severity Cross-Site Scripting vulnerabilities, one is a medium severity Prototype Pollution vulnerability, and the final one is a low severity Denial of Service vulnerability.
The report concludes that unless you are using jQuery 3.4.0 and above then you are using vulnerable jQuery versions.
In fact, according to W3Techs, jQuery v1.x is used in 84% of all websites using jQuery. This exposes them to four medium severity XSS vulnerabilities and the situation is exacerbated by the use of jQuery extension libraries, 13 of which have identified vulnerabilities.
Snyk calls particular attention to jquery.js which is a malicious package and accounted for 5,444 downloads in the past 12 months. it vulnerability severity is rated as high as is that of two other malicious versions of open source community modules which have fewer annual downloads - jquery-airload (322 downloads) and github-jquery-widgets (232 downloads).
It also pointed to three other extension libraries, jquery-mobile, jquery-file-upload and jquery-colorbox, which together account for more than 340,000 downloads in the past 12 months, despite including Arbitrary Code Execution and Cross-Site Scripting security vulnerabilities and not having any upgrade path to remediate them.
or email your comment to: firstname.lastname@example.org
|Last Updated ( Thursday, 07 November 2019 )|