Cross-site Scripting (XSS) Affecting python-XStatic-jquery-ui package, versions *


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.36% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL7-PYTHONXSTATICJQUERYUI-5257298
  • published26 Mar 2023
  • disclosed20 Jul 2022

Introduced: 20 Jul 2022

CVE-2022-31160  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 python-XStatic-jquery-ui.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-XStatic-jquery-ui package and not the python-XStatic-jquery-ui package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling .checkboxradio( "refresh" ) on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the label in a span.

CVSS Base Scores

version 3.1