jQuery Mobile redirect XSS vulnerability

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

**TL;DR** - Any website that uses jQuery Mobile and has an open redirect is now vulnerable to XSS - and there's nothing you can do about it, there's not even patch ¯\\\_(ツ)_/¯ . [jQuery Mobile](https://jquerymobile.com/) is a cool jQuery UI system that makes building mobile apps easier. It does some part of what other frameworks like Ember and Angular do for routing. Pretty cool, and useful. Also vulnerable to XSS. While researching [CSP bypasses](http://sirdarckcat.blogspot.com/2016/12/how-to-bypass-csp-nonces-with-dom-xss.html) a few months ago, I noticed that jQuery Mobile had this funky behavior in which it would fetch any URL in the `location.hash`and put it in `innerHTML`. I thought that was pretty weird, so decided to see if it was vulnerable to XSS. Turns out it is! ### The bug The summary is: 1. jQuery Mobile checks if you have anything in `location.hash`. 2. If your location.hash looks like a URL, it will try to set `history.pushState` on it, then it will do an...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息