-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency jquery-ui-rails to v7 [security] #2655
Conversation
698ebb8
to
15faf5c
Compare
1b19803
to
083c8a3
Compare
083c8a3
to
2bb963c
Compare
2bb963c
to
1eb58d0
Compare
0e50234
to
2c852d9
Compare
80eebd9
to
438a0ba
Compare
438a0ba
to
7340604
Compare
7340604
to
e2e3da3
Compare
38e6a01
to
fc8cfaf
Compare
fd24f99
to
b49b9a0
Compare
b49b9a0
to
c1a8488
Compare
afc66fa
to
c72d955
Compare
c72d955
to
1d64ec2
Compare
6d2fde5
to
bff27d6
Compare
d1fe0f5
to
340bfb6
Compare
4d25d65
to
fa79102
Compare
fa79102
to
8c2fd99
Compare
|
8c2fd99
to
5ffdc54
Compare
5ffdc54
to
b629724
Compare
f742a4c
to
d1367a8
Compare
7c720f3
to
be04449
Compare
be04449
to
57f46df
Compare
Renovate Ignore NotificationBecause you closed this PR without merging, Renovate will ignore this update. You will not get PRs for any future If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR. |
This PR contains the following updates:
'6.0.1'
->'7.0.0'
GitHub Vulnerability Alerts
CVE-2021-41182
Impact
Accepting the value of the
altField
option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:will call the
doEvilThing
function.Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the
altField
option is now treated as a CSS selector.Workarounds
A workaround is to not accept the value of the
altField
option from untrusted sources.For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
CVE-2021-41183
Impact
Accepting the value of various
*Text
options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:will call
doEvilThing
with 6 different parameters coming from all*Text
options.Patches
The issue is fixed in jQuery UI 1.13.0. The values passed to various
*Text
options are now always treated as pure text, not HTML.Workarounds
A workaround is to not accept the value of the
*Text
options from untrusted sources.For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
CVE-2021-41184
Impact
Accepting the value of the
of
option of the.position()
util from untrusted sources may execute untrusted code. For example, invoking the following code:will call the
doEvilThing()
function.Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the
of
option is now treated as a CSS selector.Workarounds
A workaround is to not accept the value of the
of
option from untrusted sources.For more information
If you have any questions or comments about this advisory, search for a relevant issue in the jQuery UI repo. If you don't find an answer, open a new issue.
Release Notes
joliss/jquery-ui-rails (jquery-ui-rails)
v7.0.0
Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.