Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Core: Prevent Object.prototype pollution for $.extend( true, ... ) #4333

Merged
merged 1 commit into from Mar 25, 2019

Conversation

mgol
Copy link
Member

@mgol mgol commented Mar 25, 2019

Summary

Prevent Object.prototype pollution for $.extend( true, ... )

Checklist

@mgol mgol added this to the 3.4.0 milestone Mar 25, 2019
@mgol mgol self-assigned this Mar 25, 2019
@mgol mgol merged commit 753d591 into jquery:master Mar 25, 2019
@mgol mgol deleted the extend-proto branch March 25, 2019 16:57
@DanielRuf
Copy link

added this to the 3.4.0 milestone 4 days ago

Imo security patches should be patch releases then for all affected versions (3.3, 3.x, 2.x).

Do we really need a 3.4.0 release?

@oliviernt
Copy link

I second @DanielRuf. A patch would allow a smoother update path without requiring everybody to wait for the (currently 13) unresolved issues to be resolved and then having to test if the minor version doesn't break anything...

@DanielRuf
Copy link

DanielRuf commented Mar 30, 2019

Short question:

Was a CVE ID requested for this?

@lirantal
Copy link

I will be requesting that through the Node.js Security WG and update once we have it.

@lirantal
Copy link

lirantal commented Apr 2, 2019

Any ETA regarding the new version?

@mgol
Copy link
Member Author

mgol commented Apr 2, 2019 via email

@DanielRuf
Copy link

@oliviernt you can maybe use these patches or try to create one with patch-package or native diff -u orig patched.

I have published some for the unmodified releases at https://github.com/DanielRuf/snyk-js-jquery-174006?files=1

I have also created a YARA rule for DevSecOps solutions if needed.

We will probably patch the used versions in all our projects.

@louissanchez84
Copy link

@DanielRuf

This might be a stupid question, but is jquery-3.3.1.min impacted as well?

@DanielRuf
Copy link

@louissanchez84 all versions are impacted by this vuln.

@DanielRuf
Copy link

I have only created the patches for the latest releases of 1.x, 2.x and 3.x. The unminified releases can be patched with the same patch files and fuzzy patching (should be the case by default).

@louissanchez84
Copy link

@DanielRuf Thank you for the quick response.

@mgol
Copy link
Member Author

mgol commented Apr 10, 2019

jQuery 3.4.0 with the fix has been released:
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/

We don’t plan to backport the change ourselves to older release lines at this point. jQuery 3.0 has been released a few years ago already and older versions have a more serious CVE on them that we only fixed in jQuery 3.0 as someone might depend on the older behavior:
https://jquery.com/upgrade-guide/3.0/#breaking-change-cross-domain-script-requests-must-be-declared

@lirantal
Copy link

CVE assigned: CVE-2019-5428
Node.js Security WG report: nodejs/security-wg#507

@iamleot
Copy link

iamleot commented Apr 24, 2019

Side-note regarding the CVE(s)... Isn't CVE-2019-5428 a duplicate of CVE-2019-11358? If that's the case, @lirantal can you please get in touch with MITRE to mark it as duplicate?

Thank you!

@lirantal
Copy link

5248 targets the vulnerability in jquery as the product, where-as 11358 targets a Drupal version (or component inside it) as an advisory. Not convinced they are duplicates though.

@iamleot
Copy link

iamleot commented Apr 24, 2019 via email

@lirantal
Copy link

I take it back. They do seem duplicates as the NVD report actually refers to jQuery and in short glance it seemed to be referring to Drupal. I'll contact them and update.

@DanielRuf
Copy link

CVE-2019-5428 does also not link the Snyk report directly. While CVE-2019-11358 does.

I have linked CVE-2019-11358 as it contains more info.

@DanielRuf
Copy link

Assigning CNA for https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5428 was HackerOne.

@lirantal
Copy link

Request logged at CVE Request 679060

@iamleot
Copy link

iamleot commented Apr 24, 2019 via email

@iamleot
Copy link

iamleot commented Apr 24, 2019 via email

@DanielRuf
Copy link

Ah ok. Not sure what this other number is (request? much higher number) but I'll wait and still use the CVE-2019-11358 in references as it contains the scores and the analysis is not pending .

@lirantal
Copy link

Update from MITRE ticket: CVE-2019-11358 will be the leading one and others will be mentioned and set as duplicates.

Have a great weekend fellas!

axeloradmin pushed a commit to axelor/axelor-open-platform that referenced this pull request May 1, 2019
axeloradmin pushed a commit to axelor/axelor-open-platform that referenced this pull request May 10, 2019
@mgol mgol mentioned this pull request Jun 24, 2019
bcutler-work pushed a commit to pivotaltracker/jquery that referenced this pull request Jul 26, 2019
bcutler-work pushed a commit to pivotaltracker/jquery that referenced this pull request Jul 26, 2019
Closes jquerygh-4333

Signed-off-by: Benjamin Cutler <bcutler@pivotal.io>
@lock lock bot locked as resolved and limited conversation to collaborators Oct 23, 2019
scs-ahkr pushed a commit to acronisscs/jquery that referenced this pull request Jan 29, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Development

Successfully merging this pull request may close these issues.

None yet

7 participants