Skip to content
This repository has been archived by the owner on Dec 13, 2022. It is now read-only.

Security - Vulnerability in javascript library jquery-ui-dialog 1.8.14 & jquery 1.7.2 #6055

Open
qladriere opened this issue Feb 9, 2018 · 8 comments
Labels
priority/critical status/in-backlog A dev will begin to work on your modifications soon

Comments

@qladriere
Copy link

Dears,

After executing a security test, some vulnerabilities have been found due to outdated javascript libraries. I don't know the usage of these libraries so I would like to know if you plan to update them (or if it can be planned) ?

Here are the details :

  1. File www/include/common/javascript/jquery/jquery-ui.js includes a vulnerable version of the library "jquery-ui-dialog"

The library jquery-ui-dialog version 1.8.14 has known security issues.
For more information, visit those websites:
jquery/api.jqueryui.com#281
https://snyk.io/vuln/npm:jquery-ui:20160721
Affected versions
The vulnerability is affecting all versions prior 1.12.0 (between * and 1.12.0)
Other considerations
The vulnerability might be affecting a feature of the library that the website is not using.

The library name and its version are identified based on a Retire.js signature. If the library identification is not correct, the prior vulnerability does not apply.
2) File www/include/common/javascript/jquery/jquery.min.js includes a vulnerable version of the library "jquery"

The library jquery version 1.7.2 has known security issues.
For more information, visit those websites:
jquery/jquery#2432
http://blog.jquery.com/2016/01/08/jq...1-12-released/
Affected versions
The vulnerability is affecting all versions prior 1.12.0 (between 1.4.0 and 1.12.0)
Other considerations
The vulnerability might be affecting a feature of the library that the website is not using.

The library name and its version are identified based on a Retire.js signature. If the library identification is not correct, the prior vulnerability does not apply.

@lpinsivy
Copy link
Contributor

@qladriere do you find other issue? can you send me the result by email?

@qladriere
Copy link
Author

qladriere commented Feb 12, 2018 via email

@lpinsivy
Copy link
Contributor

Hi,

We release a bugfix version after each sprint of 3 weeks + QA time to validate development.

The sprint for 2.8.19 version will finish this friday.

So we will start development for 2.8.20 in 1 week.

@qladriere
Copy link
Author

Hello,

Thanks for this info. So I guess that it should be done by end of March?

@lpinsivy
Copy link
Contributor

I hope too ;)

@qladriere
Copy link
Author

Hello,
In this version (2.8.20), do you plan also to solve other issues like "cross site request forgery", "password field",...?

@qladriere
Copy link
Author

Hello,
Can you please let me know about the status concerning this issue? Is it solved in the new version (I see it's still in "Todo Dev in 2.8.20")? Also, what about the other findings ("cross site request forgery",...) ?

@qladriere
Copy link
Author

Hello,
Still no news... I see that you removed this issue from 2.8.20 but not planned for another version. Can you please let me know if you plan to solve these sec issues? If yes, do you already know when?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
priority/critical status/in-backlog A dev will begin to work on your modifications soon
Projects
None yet
Development

No branches or pull requests

3 participants