Lucene search

K
nvd[email protected]NVD:CVE-2021-41182
HistoryOct 26, 2021 - 3:15 p.m.

CVE-2021-41182

2021-10-2615:15:10
CWE-79
web.nvd.nist.gov
1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.004 Low

EPSS

Percentile

73.0%

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the altField option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the altField option is now treated as a CSS selector. A workaround is to not accept the value of the altField option from untrusted sources.

Affected configurations

NVD
Node
jqueryuijquery_uiRange<1.13.0jquery
Node
fedoraprojectfedoraMatch33
OR
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
Node
netapph500sMatch-
AND
netapph500s_firmwareMatch-
Node
netapph700sMatch-
AND
netapph700s_firmwareMatch-
Node
netapph300eMatch-
AND
netapph300e_firmwareMatch-
Node
netapph500eMatch-
AND
netapph500e_firmwareMatch-
Node
netapph700eMatch-
AND
netapph700e_firmwareMatch-
Node
netapph410sMatch-
AND
netapph410s_firmwareMatch-
Node
netapph410cMatch-
AND
netapph410c_firmwareMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
debiandebian_linuxMatch9.0
Node
drupaldrupalRange7.07.86
Node
oraclecommunications_interactive_session_recorderMatch6.4
OR
oraclecommunications_operations_monitorMatch4.3
OR
oraclecommunications_operations_monitorMatch4.4
OR
oraclecommunications_operations_monitorMatch5.0
OR
oraclehospitality_suite8Range8.11.08.14.0
OR
oraclehospitality_suite8Match8.10.2
OR
oraclemysql_enterprise_monitorRange8.0.29
OR
oracleprimavera_unifierMatch17.7
OR
oracleprimavera_unifierMatch17.8
OR
oracleprimavera_unifierMatch17.9
OR
oracleprimavera_unifierMatch17.10
OR
oracleprimavera_unifierMatch17.11
OR
oracleprimavera_unifierMatch17.12
OR
oracleprimavera_unifierMatch18.8
OR
oracleprimavera_unifierMatch19.12
OR
oracleprimavera_unifierMatch20.12
OR
oracleprimavera_unifierMatch21.12
OR
oracleweblogic_serverMatch12.2.1.3.0
OR
oracleweblogic_serverMatch12.2.1.4.0
OR
oracleweblogic_serverMatch14.1.1.0.0
Node
tenabletenable.scRange<5.21.0
Node
oracleagile_plmMatch9.3.6
OR
oracleapplication_expressRange<22.1.1
OR
oraclebanking_platformMatch2.9.0
OR
oraclebanking_platformMatch2.12.0
OR
oraclebig_data_spatial_and_graphRange<23.1
OR
oraclebig_data_spatial_and_graphMatch23.1
OR
oraclecommunications_interactive_session_recorderMatch6.4
OR
oraclecommunications_operations_monitorMatch4.3
OR
oraclecommunications_operations_monitorMatch4.4
OR
oraclecommunications_operations_monitorMatch5.0
OR
oraclehospitality_inventory_managementMatch9.1.0
OR
oraclehospitality_materials_controlMatch18.1
OR
oraclehospitality_suite8Range8.11.08.14.0
OR
oraclehospitality_suite8Match8.10.2
OR
oraclejd_edwards_enterpriseone_toolsRange9.2.6.3
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.58
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.59
OR
oraclepolicy_automationRange12.2.012.2.25
OR
oracleprimavera_unifierRange17.717.12
OR
oracleprimavera_unifierMatch18.8
OR
oracleprimavera_unifierMatch19.12
OR
oracleprimavera_unifierMatch20.12
OR
oracleprimavera_unifierMatch21.12
OR
oraclerest_data_servicesRange<22.1.1-
OR
oraclerest_data_servicesMatch22.1.1-
OR
oracleweblogic_serverMatch12.2.1.3.0
OR
oracleweblogic_serverMatch12.2.1.4.0
OR
oracleweblogic_serverMatch14.1.1.0.0

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.004 Low

EPSS

Percentile

73.0%