First published: Mon Nov 01 2021(Updated: )
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. Reference: <a href="https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc">https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc</a> Upstream patch: <a href="https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63">https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63</a>
Affected Software | Affected Version | How to fix |
---|---|---|
jQuery UI | <1.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2019144 is considered high due to the potential execution of untrusted code.
To fix REDHAT-BUG-2019144, upgrade to jQuery UI version 1.13.0 or later.
The affected component in REDHAT-BUG-2019144 is the Datepicker widget in jQuery UI prior to version 1.13.0.
If not addressed, REDHAT-BUG-2019144 could allow an attacker to inject and execute untrusted code through the altField option.
REDHAT-BUG-2019144 was reported prior to the release of jQuery UI version 1.13.0.