PT-2014-2103 · Jquery +2 · Jquery Ui +2
Jzaefferer
·
Published
2014-11-24
·
Updated
2025-06-17
·
CVE-2010-5312
6.1
Medium
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions:
jqueryui versions prior to 1.10.0
jqueryui version 1.8.ooops.21+dfsg-2+deb7u2
jqueryui version 1.10.1+dfsg-1
Description:
A cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the `title` option. This would allow a remote attacker to inject arbitrary code through cross-site scripting.
Recommendations:
For versions prior to 1.10.0, upgrade to version 1.10.0 or later.
For version 1.8.ooops.21+dfsg-2+deb7u2, this version has already fixed the issue.
For version 1.10.1+dfsg-1, this version has already fixed the issue.
As a temporary workaround, consider disabling the use of the `title` option in the Dialog widget until a patch is available.
Exploit
Fix
XSS
Weakness Enumeration
Related Identifiers
Affected Products
References · 79
- 🔥 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2010-5312.yml⭐ 1022 🔗 220 · Exploit
- 🔥 http://bugs.jqueryui.com/ticket/6016 · Exploit
- https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3⭐ 11259 🔗 5317 · Vendor Advisory
- https://osv.dev/vulnerability/DLA-2889-1 · Vendor Advisory
- https://osv.dev/vulnerability/MGASA-2014-0559 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2010-5312 · Security Note
- https://osv.dev/vulnerability/GHSA-wcm2-9c89-wmfm · Vendor Advisory
- https://bdu.fstec.ru/vul/2021-02617 · Security Note
- https://osv.dev/vulnerability/DSA-3249-2 · Vendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3 · Vendor Advisory
- https://ubuntu.com/security/CVE-2010-5312 · Vendor Advisory
- https://advisories.mageia.org/MGASA-2014-0559.html · Security Note
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4 · Vendor Advisory
- https://osv.dev/vulnerability/DSA-3249-1 · Vendor Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1462.html · Vendor Advisory