Name | CVE-2021-41184 |
Description | jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3230-1, DLA-3551-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
jqueryui (PTS) | bullseye | 1.12.1+dfsg-8+deb11u2 | fixed |
| bookworm, sid, trixie | 1.13.2+dfsg-1 | fixed |
otrs2 (PTS) | bullseye/non-free | 6.0.32-6 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[stretch] - jqueryui <no-dsa> (Minor issue)
[bullseye] - otrs2 <no-dsa> (Non-free not supported)
[stretch] - otrs2 <no-dsa> (Non-free not supported)
https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327
https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280
https://www.znuny.org/en/advisories/zsa-2022-01