First published: Mon Nov 01 2021(Updated: )
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. Reference: <a href="https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327">https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327</a> Upstream patch: <a href="https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280">https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280</a>
Affected Software | Affected Version | How to fix |
---|---|---|
jQuery UI | <1.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2019153 is high due to the potential execution of untrusted code.
To fix REDHAT-BUG-2019153, update jQuery UI to version 1.13.0 or later.
REDHAT-BUG-2019153 addresses a vulnerability in the `of` option of the `.position()` utility that could allow code execution.
All versions of jQuery UI prior to 1.13.0 are affected by REDHAT-BUG-2019153.
The impact of REDHAT-BUG-2019153 on web applications includes the risk of executing malicious scripts from untrusted sources.