First published: Thu Jan 18 2018(Updated: )
Affected versions of `jquery` use a lowercasing logic on attribute names. When given a boolean attribute with a name that contains uppercase characters, `jquery` enters into an infinite recursion loop, exceeding the call stack limit, and resulting in a denial of service condition. ## Recommendation Update to version 3.0.0 or later.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jquery Jquery | =3.0.0-rc1 | |
rubygems/jquery-rails | =3.0.0-rc.1 | 3.0.0 |
maven/org.webjars.npm:jquery | =3.0.0-rc.1 | 3.0.0 |
nuget/jQuery | =3.0.0-rc.1 | 3.0.0 |
npm/jquery | =3.0.0-rc.1 | 3.0.0 |
=3.0.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-10707 is high with a severity value of 7.5.
Versions 3.0.0-rc.1 of jQuery are affected by CVE-2016-10707.
CVE-2016-10707 exploits the vulnerability by entering into an infinite recursion loop when given a boolean attribute with uppercase characters, causing a denial of service.
The recommended remedy for CVE-2016-10707 is to update to version 3.0.0 of jQuery.
More information about CVE-2016-10707 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2016-10707), [GitHub Issue](https://github.com/jquery/jquery/issues/3133), [GitHub Advisory](https://github.com/advisories/GHSA-mhpp-875w-9cpv).