ghsa-9mvj-f7w8-pvh2
Vulnerability from github
Published
2024-07-11 18:31
Modified
2025-01-31 16:28
Severity ?
6.4 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L
Summary
Bootstrap Cross-Site Scripting (XSS) vulnerability
Details
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide
and data-slide-to
attributes can be exploited through the href attribute of an <a>
tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "bootstrap" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "RubyGems", "name": "bootstrap" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "bootstrap" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "RubyGems", "name": "bootstrap-sass" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "bootstrap.sass" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "twbs/bootstrap" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.webjars:bootstrap" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.webjars.npm:bootstrap" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "bootstrap-sass" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "last_affected": "3.4.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-6484" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2024-08-01T21:28:38Z", "nvd_published_at": "2024-07-11T17:15:17Z", "severity": "MODERATE" }, "details": "A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the `data-slide` and `data-slide-to` attributes can be exploited through the href attribute of an `\u003ca\u003e` tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim\u0027s browser.", "id": "GHSA-9mvj-f7w8-pvh2", "modified": "2025-01-31T16:28:19Z", "published": "2024-07-11T18:31:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6484" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml" }, { "type": "PACKAGE", "url": "https://github.com/twbs/bootstrap" }, { "type": "WEB", "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6484" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L", "type": "CVSS_V4" } ], "summary": "Bootstrap Cross-Site Scripting (XSS) vulnerability" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.