@ those that like to dive deeper into jQuery code security for the use in websites, read on.
For this particular version of jQuery (jquery - 1.7.2 : (active1))
3rd party $.get()
autoexecutes if content type is text/javascript. * Re:
https://bugs.jquery.com/ticket/11290
Sources and sinks in third party code: : https://ajax.googleapis.com/ajax/libs/jquery/1.7/jquery.min.js
error report
error: line:3: SyntaxError: missing ) in parenthetical:
error: line:3: :1),i.top<t&&i.bottom>0):!1};this._onLoad=function(){r.bPageFullyLoaded=!0};this._onResize=function(){if(!n||!n.isFullScreen||!n.isFullScreen()){var t=r._winW();r.width!=t&&(r.width=t)}};this._getActivePlacement=function(){var f=t[r.settings.type],u,n,
error: line:3: …^
Also how it relates to olark.code and settings:
https://gist.github.com/draft13/9807878 (see bolded - pol).
See for this
http://research.insecurelabs.org/jquery/test/
Then consider this: Missing SRI hash in the light of: Results from scanning URL:
https://ajax.googleapis.com/ajax/libs/jquery/1.7/jquery.min.js
Number of sources found: 38
Number of sinks found: 21
No one buiding websites performs such testing on a regular basis like we do here, but one can easily imagine how scripts are being run, vulnerable to shellcode attacks and XSS exploits, in that case the reason to retire such script versions and retirable script is obvious:
For understanding
cl.write & inner HTML & b.value.a
exploitation, read here: htxp://howcanfix.com/28955/help-me-understand-this-javascript-exploit.
Would be a nice example to be used by TINSEC students as a test case to solve insecurity aspects (test in jslint & jsunpack), and for us here to get further protection against, also is important in general browser protection.
Remember when testing * I first got an unresponsive browser (latest flaw of Iridium, and then it collapsed), so be aware where Shellcode and Javascript can have it’s evil ways.
polonus (volunteer website security analyst and website error-hunter)