CVE-2015-9251

CVSS V2 Medium 4.3 CVSS V3 Medium 6.1
Description
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Overview
  • CVE ID
  • CVE-2015-9251
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2018-01-18T23:29:00
  • Last Modified Date
  • 2021-01-08T12:15:10
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* 1 OR 3.0.0
cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:business_process_management_suite:11.1.1.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* 1 OR 7.0.0.1
cpe:2.3:a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:* 1 OR 6.1.0.4.0
cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:* 1 OR 7.2
cpe:2.3:a:oracle:endeca_information_discovery_studio:3.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_operations_monitor:3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_operations_monitor:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* 1 OR 7.3.3 7.3.5
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* 1 OR 8.0.0 8.0.7
cpe:2.3:a:oracle:financial_services_asset_liability_management:*:*:*:*:*:*:*:* 1 OR 8.0.4 8.0.7
cpe:2.3:a:oracle:financial_services_data_integration_hub:*:*:*:*:*:*:*:* 1 OR 8.0.5 8.0.7
cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:*:*:*:*:*:*:*:* 1 OR 8.0.4 8.0.7
cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* 1 OR 8.0.4 8.0.7
cpe:2.3:a:oracle:financial_services_liquidity_risk_management:*:*:*:*:*:*:*:* 1 OR 8.0.2 8.0.6
cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* 1 OR 8.0.2 8.0.7
cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:* 1 OR 8.0.4 8.0.6
cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:healthcare_foundation:7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:healthcare_foundation:7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:hospitality_cruise_fleet_management:9.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:oss_support_tools:19.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* 1 OR 17.1 17.12
cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:real-time_scheduler:2.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_allocation:15.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_invoice_matching:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_sales_audit:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_workforce_management_software:1.60.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_workforce_management_software:1.64.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:siebel_ui_framework:18.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:siebel_ui_framework:18.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:* 1 OR 4.3.0.1 4.3.0.4
cpe:2.3:a:oracle:utilities_mobile_workforce_management:2.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:weblogic_server:12.1.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 6.1
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.8
  • Impact Score
  • 2.7
References
Reference URL Reference Tags
https://snyk.io/vuln/npm:jquery:20150627 Patch Third Party Advisory
https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2 Patch Third Party Advisory
https://github.com/jquery/jquery/pull/2588 Issue Tracking Patch Third Party Advisory
https://github.com/jquery/jquery/issues/2432 Issue Tracking Patch Third Party Advisory
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc Patch Third Party Advisory
https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch
http://www.securityfocus.com/bid/105658 Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch
https://seclists.org/bugtraq/2019/May/18
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html
http://seclists.org/fulldisclosure/2019/May/13
http://seclists.org/fulldisclosure/2019/May/11
http://seclists.org/fulldisclosure/2019/May/10
http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://www.tenable.com/security/tns-2019-08
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://www.oracle.com/security-alerts/cpujan2020.html
https://access.redhat.com/errata/RHSA-2020:0481
https://access.redhat.com/errata/RHSA-2020:0729
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
https://security.netapp.com/advisory/ntap-20210108-0004/
History
Created Old Value New Value Data Type Notes
2022-05-10 07:28:20 Added to TrackCVE
2022-12-03 01:18:53 2018-01-18T23:29Z 2018-01-18T23:29:00 CVE Published Date updated
2022-12-03 01:18:53 2021-01-08T12:15:10 CVE Modified Date updated
2022-12-03 01:18:53 Modified Vulnerability Status updated