Описание
Cross-site Scripting in bootstrap-table
This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-23472
- https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218
- https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688
- https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597
Пакеты
bootstrap-table
<= 1.19.0
Отсутствует
Связанные уязвимости
This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
Уязвимость функции escapeHTML программного средства Bootstrap Table, позволяющая нарушителю отказать воздействие на конфиденциальность и целостность защищаемой информации