Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented May 30, 2025

This PR contains the following updates:

Package Change Age Confidence
jquery-ui-rails '6.0.1' -> '8.0.0' age confidence

GitHub Vulnerability Alerts

CVE-2021-41182

Impact

Accepting the value of the altField option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:

$( "#datepicker" ).datepicker( {
	altField: "<img onerror='doEvilThing()' src='/404' />",
} );

will call the doEvilThing function.

Patches

The issue is fixed in jQuery UI 1.13.0. Any string value passed to the altField option is now treated as a CSS selector.

Workarounds

A workaround is to not accept the value of the altField option from untrusted sources.

For more information

If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.

CVE-2021-41183

Impact

Accepting the value of various *Text options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:

$( "#datepicker" ).datepicker( {
	showButtonPanel: true,
	showOn: "both",
	closeText: "<script>doEvilThing( 'closeText XSS' )</script>",
	currentText: "<script>doEvilThing( 'currentText XSS' )</script>",
	prevText: "<script>doEvilThing( 'prevText XSS' )</script>",
	nextText: "<script>doEvilThing( 'nextText XSS' )</script>",
	buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>",
	appendText: "<script>doEvilThing( 'appendText XSS' )</script>",
} );

will call doEvilThing with 6 different parameters coming from all *Text options.

Patches

The issue is fixed in jQuery UI 1.13.0. The values passed to various *Text options are now always treated as pure text, not HTML.

Workarounds

A workaround is to not accept the value of the *Text options from untrusted sources.

For more information

If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.

CVE-2021-41184

Impact

Accepting the value of the of option of the .position() util from untrusted sources may execute untrusted code. For example, invoking the following code:

$( "#element" ).position( {
	my: "left top",
	at: "right bottom",
	of: "<img onerror='doEvilThing()' src='/404' />",
	collision: "none"
} );

will call the doEvilThing() function.

Patches

The issue is fixed in jQuery UI 1.13.0. Any string value passed to the of option is now treated as a CSS selector.

Workarounds

A workaround is to not accept the value of the of option from untrusted sources.

For more information

If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.

CVE-2022-31160

Impact

Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call .checkboxradio( "refresh" ) on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentially executing JavaScript code.

For example, starting with the following initial secure HTML:

<label>
	<input id="test-input">
	&lt;img src=x onerror="alert(1)"&gt;
</label>

and calling:

$( "#test-input" ).checkboxradio();
$( "#test-input" ).checkboxradio( "refresh" );

will turn the initial HTML into:

<label>
	<!-- some jQuery UI elements -->
	<input id="test-input">
	<img src=x onerror="alert(1)">
</label>

and the alert will get executed.

Patches

The bug has been patched in jQuery UI 1.13.2.

Workarounds

To remediate the issue, if you can change the initial HTML, you can wrap all the non-input contents of the label in a span:

<label>
	<input id="test-input">
	<span>&lt;img src=x onerror="alert(1)"&gt;</span>
</label>

References

https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/

For more information

If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.


Release Notes

joliss/jquery-ui-rails (jquery-ui-rails)

v8.0.0

Compare Source

  • Update to jQuery UI 1.14.1

v7.0.0

Compare Source

  • Update to jQuery UI 1.13.0

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the dependencies Pull requests that update a dependency file label May 30, 2025
@renovate
Copy link
Contributor Author

renovate bot commented May 30, 2025

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: Gemfile.lock
[11:04:07.054] INFO (904): Installing tool [email protected]...
/usr/local/containerbase/tools/v2/ruby.sh: line 80: /etc/gemrc: Permission denied
[11:04:07.807] ERROR (904): Command failed with exit code 1: bash /usr/local/containerbase/bin/v2-install-tool.sh install ruby 3.0.3
[11:04:07.808] FATAL (904): Install tool ruby failed in 762ms.


@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 5 times, most recently from dc43bad to c99b9b1 Compare June 6, 2025 23:56
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from c99b9b1 to f30a0f4 Compare June 20, 2025 12:05
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from f30a0f4 to a0b4f4d Compare June 27, 2025 16:26
@renovate renovate bot changed the title Update dependency jquery-ui-rails to v7 [SECURITY] Update dependency jquery-ui-rails to v8 [SECURITY] Jun 27, 2025
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from a0b4f4d to 1be5f3d Compare July 1, 2025 13:39
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 4 times, most recently from 47e765d to cd99733 Compare July 18, 2025 17:07
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 9 times, most recently from 7a5a83d to 83e2f30 Compare July 31, 2025 14:04
@renovate renovate bot changed the title Update dependency jquery-ui-rails to v8 [SECURITY] chore(deps): update dependency jquery-ui-rails to v8 [security] Jul 31, 2025
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 5 times, most recently from a124c73 to c605404 Compare August 6, 2025 10:24
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 3 times, most recently from eacd3d0 to 825091c Compare August 8, 2025 09:50
@renovate renovate bot changed the title chore(deps): update dependency jquery-ui-rails to v8 [security] Update dependency jquery-ui-rails to v8 [SECURITY] Aug 8, 2025
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 2 times, most recently from 30373ce to 918ef87 Compare August 18, 2025 07:12
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 3 times, most recently from 7addd28 to 21b6262 Compare September 5, 2025 14:00
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 3 times, most recently from 0a89088 to 1c72c29 Compare September 13, 2025 05:47
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from 1c72c29 to 1fd595f Compare September 15, 2025 12:25
@renovate renovate bot added the major label Sep 15, 2025
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch 6 times, most recently from 922c155 to 87dd653 Compare September 19, 2025 18:43
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from 87dd653 to 83f939a Compare October 21, 2025 11:26
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from 83f939a to df95510 Compare November 14, 2025 12:05
@renovate renovate bot changed the title Update dependency jquery-ui-rails to v8 [SECURITY] chore(deps): update dependency jquery-ui-rails to v8 [security] Nov 14, 2025
@renovate renovate bot force-pushed the renovate/rubygems-jquery-ui-rails-vulnerability branch from df95510 to 04e1f2b Compare November 14, 2025 12:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file major

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant