-
Notifications
You must be signed in to change notification settings - Fork 17
chore(deps): update dependency jquery-ui-rails to v8 [security] #2799
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/rubygems-jquery-ui-rails-vulnerability
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Author
|
dc43bad to
c99b9b1
Compare
c99b9b1 to
f30a0f4
Compare
f30a0f4 to
a0b4f4d
Compare
a0b4f4d to
1be5f3d
Compare
47e765d to
cd99733
Compare
7a5a83d to
83e2f30
Compare
a124c73 to
c605404
Compare
eacd3d0 to
825091c
Compare
30373ce to
918ef87
Compare
7addd28 to
21b6262
Compare
0a89088 to
1c72c29
Compare
1c72c29 to
1fd595f
Compare
922c155 to
87dd653
Compare
87dd653 to
83f939a
Compare
83f939a to
df95510
Compare
df95510 to
04e1f2b
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
'6.0.1'->'8.0.0'GitHub Vulnerability Alerts
CVE-2021-41182
Impact
Accepting the value of the
altFieldoption of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:will call the
doEvilThingfunction.Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the
altFieldoption is now treated as a CSS selector.Workarounds
A workaround is to not accept the value of the
altFieldoption from untrusted sources.For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
CVE-2021-41183
Impact
Accepting the value of various
*Textoptions of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:will call
doEvilThingwith 6 different parameters coming from all*Textoptions.Patches
The issue is fixed in jQuery UI 1.13.0. The values passed to various
*Textoptions are now always treated as pure text, not HTML.Workarounds
A workaround is to not accept the value of the
*Textoptions from untrusted sources.For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
CVE-2021-41184
Impact
Accepting the value of the
ofoption of the.position()util from untrusted sources may execute untrusted code. For example, invoking the following code:will call the
doEvilThing()function.Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the
ofoption is now treated as a CSS selector.Workarounds
A workaround is to not accept the value of the
ofoption from untrusted sources.For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
CVE-2022-31160
Impact
Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call
.checkboxradio( "refresh" )on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentially executing JavaScript code.For example, starting with the following initial secure HTML:
and calling:
will turn the initial HTML into:
and the alert will get executed.
Patches
The bug has been patched in jQuery UI 1.13.2.
Workarounds
To remediate the issue, if you can change the initial HTML, you can wrap all the non-input contents of the
labelin aspan:References
https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
Release Notes
joliss/jquery-ui-rails (jquery-ui-rails)
v8.0.0Compare Source
v7.0.0Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.