Closed (fixed)
Project:
Drupal core
Version:
7.56
Component:
javascript
Priority:
Normal
Category:
Support request
Assigned:
Unassigned
Reporter:
Created:
30 Oct 2017 at 19:31 UTC
Updated:
13 Dec 2018 at 20:44 UTC
Jump to comment: Most recent
Comments
Comment #2
ayesh commentedAs far as I know, 1.4.4 is the latest patch release of the 1.4 branch.
We can't say Drupal is vulnerable because jQuery is client side code, and there is quite a few places that jQuery is invoked with dynamic data. Ajax requests pops into my head.
Can you post more information on the particular vulnerabilities you have focused on/
Comment #3
aohrvetpv commentedThanks for the reply. I don't understand why a vulnerability in Drupal's client-side code would not be considered a vulnerability with Drupal. Users can't be expected to disable JavaScript for a site because they realize it is Drupal 7 and it might send them vulnerable code to execute. If, for instance, a site administrator is targeted with an XSS vulnerability, it does not matter whether it was made possible by client- or server-side code. (That said, I don't know whether any of the known jQuery 1.4.4 vulnerabilities actually affect Drupal 7.56.)
A Sonar (https://sonarwhal.com) scan of a Drupal 7 site identified these vulnerabilities due to jQuery 1.4.4:
(Unknown CVE number):
https://snyk.io/vuln/npm:jquery:20150627
CVE-2014-6071:
https://snyk.io/vuln/npm:jquery:20140902
CVE-2011-4969:
https://snyk.io/vuln/npm:jquery:20110606
Comment #4
cilefen commentedThere is a way to report security vulnerabilities in Drupal.
Comment #5
mustanggb commentedSupport requests aren't critical.
Comment #6
mrgoodfellow commentedIs there a security ticket in regards to this issue and jquery version 1.4.4 ?
A security scan identified the following issues with jquery 1.4.4:
http://blog.jquery.com/2011/09/01/jquery-1-6-3-released/
"Fix an XSS attack vector: User ma.la reported a common pattern that many sites are using to select elements using location.hash that allows someone to inject script into the page. This practice seemed widespread enough that we decided to modify the selector recognition to prevent script injection for the most common case. Any string passed to $() cannot contain HTML tags (and thus no script) if it has a “#” character preceding them. See the ticket linked above for more information and a test case."
https://bugs.jquery.com/ticket/11290
Selector interpreted as HTML
XSS via 3rd party text/javascript reponses:
https://github.com/jquery/jquery/issues/2432
This was the scan results against 1.4.4
Is there any official Drupal documentation on jquery ???
Comment #7
cilefen commentedPlease contact the security team with these concerns if there is no public position on jQuery 1 in Drupal 7.