Lucene search

K
githubGitHub Advisory DatabaseGHSA-9GJ3-HWP5-PMWC
HistoryOct 26, 2021 - 2:55 p.m.

XSS in the `altField` option of the Datepicker widget in jquery-ui

2021-10-2614:55:02
CWE-79
GitHub Advisory Database
github.com
341
xss
jquery-ui
datepicker
altfield
vulnerability
patch
workaround
untrusted sources

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.003

Percentile

71.3%

Impact

Accepting the value of the altField option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:

$( "#datepicker" ).datepicker( {
	altField: "<img src="/404" />",
} );

will call the doEvilThing function.

Patches

The issue is fixed in jQuery UI 1.13.0. Any string value passed to the altField option is now treated as a CSS selector.

Workarounds

A workaround is to not accept the value of the altField option from untrusted sources.

For more information

If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don’t find an answer, open a new issue.

Affected configurations

Vulners
Node
jqueryuijquery_uiRange<7.0.0jquery
OR
org.webjars.npmjquery-uiRange<1.13.0
OR
jquery.ui.combinedRange<1.13.0
OR
jqueryuijquery_uiRange<1.13.0jquery
VendorProductVersionCPE
jqueryuijquery_ui*cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:*
org.webjars.npmjquery-ui*cpe:2.3:a:org.webjars.npm:jquery-ui:*:*:*:*:*:*:*:*
*jquery.ui.combined*cpe:2.3:a:*:jquery.ui.combined:*:*:*:*:*:*:*:*

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.003

Percentile

71.3%