Vulnerability Description
jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due to removing a logic that lowercased attribute names. Any attribute getter using a mixed-cased name for boolean attributes goes into an infinite recursion, exceeding the stack call limit.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jquery | Jquery | 3.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/jquery/jquery/issues/3133ExploitPatch
- https://github.com/jquery/jquery/pull/3134Issue TrackingPatch
- https://snyk.io/vuln/npm:jquery:20160529Third Party Advisory
- https://github.com/jquery/jquery/issues/3133ExploitPatch
- https://github.com/jquery/jquery/pull/3134Issue TrackingPatch
- https://snyk.io/vuln/npm:jquery:20160529Third Party Advisory
FAQ
What is CVE-2016-10707?
CVE-2016-10707 is a vulnerability with a CVSS score of 7.5 (HIGH). jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due to removing a logic that lowercased attribute names. Any attribute getter using a mixed-cased name for boolean attributes goes into an in...
How severe is CVE-2016-10707?
CVE-2016-10707 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10707?
Check the references section above for vendor advisories and patch information. Affected products include: Jquery Jquery.