", co...">XSS in the `of` option of the `.position()` util in jquery-ui - vulnerability database | Vulners.com", co...">", co...">", co...">
Lucene search

K
rubygemsRubySecRUBY:JQUERY-UI-RAILS-2021-41184
HistoryOct 25, 2021 - 9:00 p.m.

XSS in the `of` option of the `.position()` util in jquery-ui

2021-10-2521:00:00
RubySec
github.com
11
xss
vulnerability
jquery-ui

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Impact

Accepting the value of the of option of the
.position()
util from untrusted sources may execute untrusted code. For example, invoking the
following code:

$("#element").position( {
  my: "left top", at: "right bottom",
  of: "<img src="/404" />",
  collision: "none"
});

will call the doEvilThing() function.

Patches

The issue is fixed in jQuery UI 1.13.0. Any string value passed to
the of option is now treated as a CSS selector.

Workarounds

A workaround is to not accept the value of the of option from
untrusted sources.

For more information

If you have any questions or comments about this advisory, search
for a relevant issue in
the jQuery UI repo.

If you don’t find an answer, open a new issue."

Affected configurations

Vulners
Node
rubyjquery-ui-railsRange≤7.0.0
VendorProductVersionCPE
rubyjquery-ui-rails*cpe:2.3:a:ruby:jquery-ui-rails:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N