jQuery UI – CVE-2021-41183

Description

Cytrix has detected that the version of jQuery UI being used is vulnerable to cross-site scripting.
This can be done by abusing the ” *Text” options.

By accepting the value of the ” *Text” option of the Datepicker widget from untrusted sources, untrusted codes may be executed. Also known as CVE-2021-41183.

An attacker could abuse this to insert and execute commands for his own purposes.

Severity/Score

CVSS Version 3.x – 6.1 Medium

Recommendation

To fix CVE-2021-41183, update the jQuery UI version being used to 1.13.0 or higher.
As of now, any string value passed to the ” *Text” option is now being treated as a normal text.

Another option is to not accept the value of the ” *Text” option from any untrusted sources.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41183

https://cwe.mitre.org/data/definitions/79.html

< Return to all Vulnerabilities

HAR Files

In this article, I’ll talk and explain about HAR Files, so if you don’t know what they are, or, what do we use them for,

Read More »

HTTP VS. HTTPS

You must have once wondered what HTTP means and what is the difference between that ugly word to HTTPS, and if not, then please read

Read More »

Blue Team

We’ve talked about The Red Team before, but what about The Blue Team? How is this group different from the red one? Why would we

Read More »