First published: Mon Nov 01 2021(Updated: )
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. Reference: <a href="https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4">https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4</a> Upstream patch: <a href="https://github.com/jquery/jquery-ui/pull/1953">https://github.com/jquery/jquery-ui/pull/1953</a>
Affected Software | Affected Version | How to fix |
---|---|---|
jQuery UI | <1.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2019148 is classified as a high severity vulnerability due to potential code execution risks.
To fix REDHAT-BUG-2019148, upgrade to jQuery UI version 1.13.0 or later.
Not mitigating REDHAT-BUG-2019148 could allow attackers to execute untrusted code through the Datepicker widget.
Versions of jQuery UI prior to 1.13.0 are affected by REDHAT-BUG-2019148.
The Datepicker widget in jQuery UI that accepts various *Text options from untrusted sources is impacted by REDHAT-BUG-2019148.