Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-31160

Опубликовано: 20 июл. 2022
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS3: 6.1

Описание

jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling .checkboxradio( "refresh" ) on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the label in a span.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

1.13.2+dfsg-1
esm-apps/bionic

released

1.12.1+dfsg-5ubuntu0.18.04.1~esm2
esm-apps/focal

released

1.12.1+dfsg-5ubuntu0.20.04.1~esm3
esm-apps/jammy

released

1.13.1+dfsg-1ubuntu0.1~esm1
esm-apps/noble

not-affected

1.13.2+dfsg-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

released

1.12.1+dfsg-5ubuntu0.20.04.1
jammy

needed

Показывать по

EPSS

Процентиль: 93%
0.10183
Средний

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 3 лет назад

jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.

CVSS3: 6.1
nvd
больше 3 лет назад

jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.

CVSS3: 6.1
debian
больше 3 лет назад

jQuery UI is a curated set of user interface interactions, effects, wi ...

CVSS3: 6.1
github
больше 3 лет назад

jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label

EPSS

Процентиль: 93%
0.10183
Средний

6.1 Medium

CVSS3