Where we detected it: Results from scanning URL: -https://www.security.nl/js/jquery/jquery.securitynl.js?13757912939
Number of sources found: 117
Number of sinks found: 55
Opening up inside the scan to:
Results from scanning URL: -https://gyve7.com/wp-content/cache/autoptimize/js/autoptimize_bbc575557b9a3c4176f9cda2406c9049.js *
Number of sources found: 41
Number of sinks found: 17
* Additional wp misconfigurations detected for -gyve7 dot com: User Enumeration The first two user ID's were tested to determine if user enumeration is possible.ID User Login
1 None None
2 None gyve77
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
&
Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content./wp-content/uploads/ enabled
/wp-content/plugins/ disabled
Directory indexing was tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.
We combine Vulnerability info with DOM XSS scan results here…:
Medium CVE-2012-6708 11290 Selector interpreted as HTML found up with Erlend Oftedal’s Retire.JS extension
with our DOM-XSS scanner result and see this flaw demonstrated here (one of 49 instances of Selector )
See: http://bugs.jquery.com/ticket/11290 & https://nvd.nist.gov/vuln/detail/CVE-2012-6708 & http://research.insecurelabs.org/jquery/test/
Example:
a.getElementsByTagName!="undefined"&&f.grep(a.getElementsByTagName("input"),bm)}function bm(a){if(a.type==="checkbox"||a.type==="radio")a.defaultChecked=a.checked}function bl(a){return typeof a.getElementsByTagName!="undefined"?a.getElementsByTagName("*"):typeof a.querySelectorAll!="undefined"?[i]a.querySelectorAll("*")[/i]:[]}function bk(a,b){var c;b.nodeType===1&&
[i][b]What the bug is telling you is that jQuery may mis-identify a selector (given here in italics) containing a < as being an HTML fragment instead, and try to parse and create the relevant elements.
So the vulnerability, such as it is, is that a cleverly-crafted selector, if then passed into jQuery, could define a script tag that then executes arbitrary script code in the context of the page, potentially taking private information from the page and sending it to someone with malicious (or merely prurient) intentions[/b][/i]. (info source StackOverflow)
It is important when flagged to retire such vulnerable jQuery libraries.
What one once has acquired, should also in time be retired.
Also it explains while linting and fuzzing going over code is a must.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)