| Summary | jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`. |
|---|---|
| Publication Date | July 21, 2022, 5:15 a.m. |
| Registration Date | July 21, 2022, 10 a.m. |
| Last Update | Nov. 21, 2024, 4:04 p.m. |
| CVSS3.1 : MEDIUM | |
| スコア | 6.1 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 要 |
| 影響の想定範囲(S) | 変更あり |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | なし |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:* | 1.13.2 | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* | |||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.2:*:*:*:*:drupal:*:* | |||||
| cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.1:*:*:*:*:drupal:*:* | |||||
| cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.0:*:*:*:*:drupal:*:* | |||||
| cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.3:*:*:*:*:drupal:*:* | |||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | |||||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |||||
| Title | jqueryui の jquery ui 他複数ベンダの製品におけるクロスサイトスクリプティングの脆弱性 |
|---|---|
| Summary | jqueryui の jquery ui 他複数ベンダの製品には、クロスサイトスクリプティングの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution | ベンダアドバイザリまたはパッチ情報が公開されています。参考情報を参照して適切な対策を実施してください。 |
| Publication Date | July 20, 2022, midnight |
| Registration Date | Sept. 8, 2023, 5:28 p.m. |
| Last Update | Sept. 8, 2023, 5:28 p.m. |
| jqueryui |
| jquery ui 1.13.2 未満 |
| Drupal |
| jquery ui checkboxradio 8.x-1.0 |
| jquery ui checkboxradio 8.x-1.1 |
| jquery ui checkboxradio 8.x-1.2 |
| jquery ui checkboxradio 8.x-1.3 |
| Debian |
| Debian GNU/Linux 10.0 |
| Fedora Project |
| Fedora 35 |
| Fedora 36 |
| Fedora 37 |
| NetApp |
| H300S ファームウェア |
| H410C ファームウェア |
| H410S ファームウェア |
| H500S ファームウェア |
| H700S ファームウェア |
| OnCommand Insight |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2023年09月08日] 掲載 |
Sept. 8, 2023, 5:28 p.m. |