First published: Mon Nov 24 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/jQuery.UI.Combined | <1.10.0 | 1.10.0 |
maven/org.webjars.npm:jquery-ui | <1.10.0 | 1.10.0 |
rubygems/jquery-ui-rails | <4.0.0 | 4.0.0 |
npm/jquery-ui | <1.10.0 | 1.10.0 |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
jQuery UI | =1.10.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6662 has a medium severity rating due to its potential for cross-site scripting attacks.
To remediate CVE-2012-6662, upgrade to jQuery UI version 1.10.0 or later.
The vulnerability in CVE-2012-6662 is caused by improper handling of the title attribute in the tooltip functionality of jQuery UI.
CVE-2012-6662 affects versions of jQuery UI prior to 1.10.0 and various packages such as jQuery.UI.Combined and jquery-ui-rails.
Yes, CVE-2012-6662 can be exploited by remote attackers injecting arbitrary web scripts through the title attribute.