Bug 2156472 (CVE-2021-4243) - CVE-2021-4243 jquery-minicolors: potential XSS when using untrusted code for swatch names
Summary: CVE-2021-4243 jquery-minicolors: potential XSS when using untrusted code for ...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2021-4243
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2156473 2156474
Blocks: 2152715
TreeView+ depends on / blocked
 
Reported: 2022-12-27 04:52 UTC by TEJ RATHI
Modified: 2022-12-28 02:01 UTC (History)
0 users

Fixed In Version: jquery-minicolors 2.3.6
Clone Of:
Environment:
Last Closed: 2022-12-28 02:01:14 UTC
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2022-12-27 04:52:55 UTC
A vulnerability was found in claviska jquery-minicolors up to 2.3.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the file jquery.minicolors.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.3.6 is able to address this issue. The name of the patch is ef134824a7f4110ada53ea6c173111a4fa2f48f3. It is recommended to upgrade the affected component. VDB-215306 is the identifier assigned to this vulnerability.

https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3
https://vuldb.com/?id.215306
https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6

Comment 1 TEJ RATHI 2022-12-27 04:53:16 UTC
Created sympa tracking bugs for this issue:

Affects: epel-all [bug 2156474]
Affects: fedora-all [bug 2156473]

Comment 2 Product Security DevOps Team 2022-12-28 02:01:13 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.