Vulnerability Description
The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jquery | Jquery | - |
| Netapp | Snapcenter | - |
Related Weaknesses (CWE)
References
- http://osvdb.org/43320Broken Link
- http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdfThird Party AdvisoryURL Repurposed
- https://security.netapp.com/advisory/ntap-20190416-0007/Third Party Advisory
- http://osvdb.org/43320Broken Link
- http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdfThird Party AdvisoryURL Repurposed
- https://security.netapp.com/advisory/ntap-20190416-0007/Third Party Advisory
FAQ
What is CVE-2007-2379?
CVE-2007-2379 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the ...
How severe is CVE-2007-2379?
CVE-2007-2379 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2379?
Check the references section above for vendor advisories and patch information. Affected products include: Jquery Jquery, Netapp Snapcenter.