jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. Reference: https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4 Upstream patch: https://github.com/jquery/jquery-ui/pull/1953
Created js-jquery-ui tracking bugs for this issue: Affects: epel-all [bug 2019150] Affects: fedora-all [bug 2019149] Created pcs tracking bugs for this issue: Affects: fedora-all [bug 2019151]
After review, RHEL is unaffected as there is no instance of pcs using the affected widget. While pcs does make use of jequery-ui, it is limited in usage and scope and there is no use of the datepicker widget or '*Text' option in pcs.
This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2022:4711 https://access.redhat.com/errata/RHSA-2022:4711
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-41183