Open goiaalexandru opened 1 month ago
Was there an issue that was fixed in 1.13.2 but not included in the release notes (https://jqueryui.com/changelog/1.13.2/)?
I don't think there's anything to fix. The CVE proof of concept is so vague it can apply to any app, even if it doesn't use any dependencies. It boils down to "If you take user input and directly insert it into your page, bad things can happen" which is not a jquery-ui
problem
This CVE looks bogus, I'm in the process of disputing it.
For now, I contacted Snyk and they already took it down from their database: https://security.snyk.io/package/npm/jquery-ui
@mgol I was going to wait until Monday for a response from the reporter and then figure out how to dispute it, but that saves me a job
I’ve submitted a CVE request to Mitre to reject this CVE, I’m waiting for a response now.
I was thinking about waiting for the response first, but the whole report looked so shady and people get bombarded by security requests now that I thought I should get the ball rolling ASAP.
I submitted a request to Sonatype and they have also removed it from their database
Thanks @mgol! US Gov. Information Assurance processes are claiming jQuery provided mitigation strategies (upgrading to latest jQuery UI). Have you been in touch with them or is this just (likely) a copy paste error?
I've released jQuery UI 1.14.1 today. But there's nothing there to address this report as there's nothing to address, it's bogus. I have not been in touch with them.
I'll handle pushing back in that channel and (hopefully) getting a correction out, thanks for confirming.
Package: jquery-ui@1.13.1 or above. Vulnerability Title: [CVE-2024-30875] CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability Description: A Cross-Site Scripting (XSS) vulnerability exists in jquery-ui@1.13.1, allowing a remote attacker to execute arbitrary code and potentially obtain sensitive information. This vulnerability is triggered via a crafted payload targeting the window.addEventListener component.
CVSS Score: 5.1 (Medium) CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVE: CVE-2024-30875
Extra: https://cvefeed.io/vuln/detail/CVE-2024-30875
Steps to Reproduce:
Use jquery-ui@1.13.1 or above in a web application. Send a crafted payload to exploit the window.addEventListener component. The payload is improperly neutralized, leading to XSS vulnerability. Please consider patching this vulnerability in the next release.
Thank you!