-
Notifications
You must be signed in to change notification settings - Fork 657
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade jQueryUI #1020
Comments
dependabot scanning is already active. but we don't see an alert for jqueryui. any details on this? |
We commissioned a security audit from a consultancy for a Django project that uses django-grappelli. The project is about to go live to a wider audience, so we're keen to address as many findings as possible, as menial as they seem. Happy to assist where I can. The consultants flagged as a "low priority" finding: APP-2 Software Flaws: Outdated and Vulnerable JavaScript LibrariesDescriptionWhen vulnerabilities are identified in software the vendor of that product generally releases a ‘patch’ to fix the problem. Where these patches are not deployed in a timely manner, the vulnerabilities in the unpatched components could be exploited by an attacker. We identified that the Application Portal application makes use of outdated JavaScript libraries with known security flaws, which could potentially be leveraged to perform attacks against application users under specific circumstances. The vulnerabilities within the libraries include Cross-Site Scripting (XSS) and Prototype Pollution. Proof of ConceptVulnerable libraries:
Consequence Moderate: If exploited, the issues affecting these JavaScript libraries could be leveraged to execute attacker-controlled scripts within the victim browser, thereby potentially allowing an attacker to compromise the confidentiality, integrity or availability of Application Portal web application. Likelihood Rare: Exploitation of these flaws is only possible under very specific circumstances, and no specifically exploitable condition was identified in the time available. RiskLow RemediationUpdate to the latest version of the affected libraries.
I hope the above helps. Let me know if a PR would make your life easier. |
I've updated jQuery UI with the stable branch. I'm waiting a bit before a new release, so users can check if there are any issues (although everything looks fine with my local tests). |
Thanks for the quick turnaround! |
jquery ui update for stable/2.15.x #1020
First of all, servus and thanks for this wonderful admin integration. We've been using it in various projects for a decade now at @dbca-wa and recently at @wagov.
Our security audit flagged a mildly outdated dependency of django-grappelli to jQueryUI 1.13.0 whereas the latest version at the time of writing is jQueryUI 1.13.2 requiring jQuery 1.8+ (django-grappelli uses jQuery 3.6.0).
Would it be possible to bump jQueryUI to 1.13.2, and possibly enabling Dependabot dependency scanning?
Happy to submit a PR if this helps.
The text was updated successfully, but these errors were encountered: