CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
60.7%
Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call .checkboxradio( "refresh" )
on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentially executing JavaScript code.
For example, starting with the following initial secure HTML:
<label>
<input id="test-input">
<img src=x onerror="alert(1)">
</label>
and calling:
$( "#test-input" ).checkboxradio();
$( "#test-input" ).checkboxradio( "refresh" );
will turn the initial HTML into:
<label>
<input id="test-input">
<img src>
</label>
and the alert will get executed.
The bug has been patched in jQuery UI 1.13.2.
To remediate the issue, if you can change the initial HTML, you can wrap all the non-input contents of the label
in a span
:
<label>
<input id="test-input">
<span><img src=x onerror="alert(1)"></span>
</label>
https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don’t find an answer, open a new issue.
Vendor | Product | Version | CPE |
---|---|---|---|
* | jquery.ui.combined | * | cpe:2.3:a:*:jquery.ui.combined:*:*:*:*:*:*:*:* |
jqueryui | jquery_ui | * | cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:* |
org.webjars.npm | jquery-ui | * | cpe:2.3:a:org.webjars.npm:jquery-ui:*:*:*:*:*:*:*:* |
blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
github.com/advisories/GHSA-h6gj-6jjq-h8g9
github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
lists.debian.org/debian-lts-announce/2022/12/msg00015.html
lists.fedoraproject.org/archives/list/[email protected]/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
lists.fedoraproject.org/archives/list/[email protected]/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
lists.fedoraproject.org/archives/list/[email protected]/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
nvd.nist.gov/vuln/detail/CVE-2022-31160
security.netapp.com/advisory/ntap-20220909-0007/
www.drupal.org/sa-contrib-2022-052