You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /packages/main/src-old/component-assets/index.html
Path to vulnerable library: /packages/main/src-old/component-assets/index.html
Dependency Hierarchy:
❌ bootstrap-4.2.1.min.js (Vulnerable Library)
Found in base branch: dev
Vulnerability Details
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
CVE-2024-6531 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-4.2.1.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.2.1/js/bootstrap.min.js
Path to dependency file: /packages/main/src-old/component-assets/index.html
Path to vulnerable library: /packages/main/src-old/component-assets/index.html
Dependency Hierarchy:
Found in base branch: dev
Vulnerability Details
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
Publish Date: 2024-07-11
URL: CVE-2024-6531
CVSS 3 Score Details (6.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-vc8w-jr9v-vj7f
Release Date: 2024-07-11
Fix Resolution: bootstrap - 5.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: