UBUNTU-CVE-2020-7656

Source
https://ubuntu.com/security/CVE-2020-7656
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-7656.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-7656
Upstream
Published
2020-05-19T21:15:00Z
Modified
2025-07-18T16:45:44Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.

References

Affected packages

Ubuntu:Pro:14.04:LTS / jquery

Package

Name
jquery
Purl
pkg:deb/ubuntu/jquery@1.7.2+dfsg-2ubuntu1+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2+dfsg-2ubuntu1
1.7.2+dfsg-2ubuntu1+esm1

Ubuntu:Pro:16.04:LTS / jquery

Package

Name
jquery
Purl
pkg:deb/ubuntu/jquery@1.11.3+dfsg-4ubuntu0.1~esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2+dfsg-3ubuntu2
1.11.3+dfsg-4
1.11.3+dfsg-4ubuntu0.1~esm1