Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (1)
| Vulnerability |
Summary |
Aliases |
|
VCID-969e-x2hw-yuae
|
jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label
### Impact
Initializing a checkboxradio widget on an input enclosed within a label makes
that parent label contents considered as the input label. If you call
`.checkboxradio( "refresh" )` on such a widget and the initial HTML contained
encoded HTML entities, they will erroneously get decoded. This can lead to
potentially executing JavaScript code.
For example, starting with the following initial secure HTML:
```html
<label>
<input id="test-input">
<img src=x onerror="alert(1)">
</label>
```
and calling:
```javascript
$( "#test-input" ).checkboxradio();
$( "#test-input" ).checkboxradio( "refresh" );
```
will turn the initial HTML into:
```html
<label>
<!-- some jQuery UI elements -->
<input id="test-input">
<img src=x onerror="alert(1)">
</label>
```
and the alert will get executed.
### Patches
The bug has been patched in jQuery UI 1.13.2.
### Workarounds
To remediate the issue, if you can change the initial HTML, you can wrap all
the non-input contents of the `label` in a `span`:
```html
<label>
<input id="test-input">
<span><img src=x onerror="alert(1)"></span>
</label>
```
### References
https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
### For more information
If you have any questions or comments about this advisory, search for a
relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc).
If you don't find an answer, open a new issue.
|
CVE-2022-31160
GHSA-h6gj-6jjq-h8g9
|