First published: Thu Sep 06 2018(Updated: )
Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in `unit.html` and `testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html` and `testsDOH/_base/i18nExhaustive.js` in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.dojotoolkit:dojo | <1.14 | 1.14 |
IBM Security Verify Governance | <=10.0 | |
Dojotoolkit Dojo | <=1.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000665 is a Cross Site Scripting (XSS) vulnerability in Dojo Objective Harness (DOH) version prior to 1.14.
CVE-2018-1000665 allows an attacker to execute malicious scripts in a victim's browser, potentially leading to unauthorized actions and data theft.
Dojo Objective Harness (DOH) versions prior to 1.14 are affected by CVE-2018-1000665.
To fix CVE-2018-1000665, upgrade to Dojo Objective Harness (DOH) version 1.14 or later.
CVE-2018-1000665 has a severity rating of medium (6.1) according to the CVSS v3.0 scoring system.