Open mend-bolt-for-github[bot] opened 5 years ago
A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.8.23/jquery-ui.min.js
Path to vulnerable library: /simplesamlphp-1.15.2/www/resources/jquery-ui-1.8.js
Dependency Hierarchy: - :x: **jquery-ui-1.8.23.min.js** (Vulnerable Library)
Found in HEAD commit: 8438b0d426ddb611b173a4c67894c76002f0e6f6
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
Publish Date: 2017-03-15
URL: CVE-2016-7103
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-7103
Release Date: 2017-03-15
Fix Resolution: 1.12.0
Step up your Open Source Security Game with WhiteSource here
CVE-2016-7103 - Medium Severity Vulnerability
Vulnerable Library - jquery-ui-1.8.23.min.js
A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.8.23/jquery-ui.min.js
Path to vulnerable library: /simplesamlphp-1.15.2/www/resources/jquery-ui-1.8.js
Dependency Hierarchy: - :x: **jquery-ui-1.8.23.min.js** (Vulnerable Library)
Found in HEAD commit: 8438b0d426ddb611b173a4c67894c76002f0e6f6
Vulnerability Details
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
Publish Date: 2017-03-15
URL: CVE-2016-7103
CVSS 3 Score Details (6.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-7103
Release Date: 2017-03-15
Fix Resolution: 1.12.0
Step up your Open Source Security Game with WhiteSource here