Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-31160
HistoryJul 20, 2022 - 12:00 a.m.

CVE-2022-31160

2022-07-2000:00:00
ubuntu.com
ubuntu.com
56
jquery
ui
cross-site scripting
vulnerability
patch
html entities
javascript code

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

60.7%

jQuery UI is a curated set of user interface interactions, effects,
widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are
potentially vulnerable to cross-site scripting. Initializing a
checkboxradio widget on an input enclosed within a label makes that parent
label contents considered as the input label. Calling .checkboxradio( "refresh" ) on such a widget and the initial HTML contained encoded HTML
entities will make them erroneously get decoded. This can lead to
potentially executing JavaScript code. The bug has been patched in jQuery
UI 1.13.2. To remediate the issue, someone who can change the initial HTML
can wrap all the non-input contents of the label in a span.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchjqueryui< 1.12.1+dfsg-5ubuntu0.18.04.1~esm2UNKNOWN
ubuntu20.04noarchjqueryui< 1.12.1+dfsg-5ubuntu0.20.04.1UNKNOWN
ubuntu22.04noarchjqueryui< 1.13.1+dfsg-1ubuntu0.1~esm1UNKNOWN

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

60.7%