jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. Reference: https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327 Upstream patch: https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280
Created js-jquery-ui tracking bugs for this issue: Affects: epel-all [bug 2019155] Affects: fedora-all [bug 2019154] Created pcs tracking bugs for this issue: Affects: fedora-all [bug 2019156]
After review, RHEL is unaffected as there is no instance of pcs using the affected widget. While pcs does make use of jequery-ui, it is limited in usage and scope and there is no use of the 'of' field in the position util used.
This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2022:4711 https://access.redhat.com/errata/RHSA-2022:4711
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-41184