Cross-site Scripting (XSS) Affecting jqueryui package, versions <1.13.2+dfsg-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.3% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-JQUERYUI-5683391
  • published24 Jul 2022
  • disclosed20 Jul 2022

Introduced: 20 Jul 2022

CVE-2022-31160  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:13 jqueryui to version 1.13.2+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jqueryui package and not the jqueryui package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling .checkboxradio( &#34;refresh&#34; ) on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the label in a span.

CVSS Scores

version 3.1