CVE-2021-41182
ADVISORY - githubSummary
Impact
Accepting the value of the altField
option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
$( "#datepicker" ).datepicker( {
altField: "<img onerror='doEvilThing()' src='/404' />",
} );
will call the doEvilThing
function.
Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the altField
option is now treated as a CSS selector.
Workarounds
A workaround is to not accept the value of the altField
option from untrusted sources.
For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
Common Weakness Enumeration (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
NIST
2.8
CVSS SCORE
6.5mediumGitHub
2.8
CVSS SCORE
6.5mediumAlpine
-
Debian
-
Ubuntu
2.8
CVSS SCORE
6.1mediumBitnami
BIT-2021-41182
-
CVSS SCORE
N/AmediumBitnami
BIT-drupal-2021-41182
2.8
CVSS SCORE
6.1mediumRed Hat
2.8
CVSS SCORE
6.5mediumintheWild
-
-