The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf | third party advisory url repurposed |
http://osvdb.org/43320 | vdb entry broken link |
https://security.netapp.com/advisory/ntap-20190416-0007/ | third party advisory |