Description
SimplCommerce 1.0.0-rc uses the Bootbox.js library, which allows creation of programmatic dialog boxes using Bootstrap modals. The Bootbox.js library intentionally does not perform any sanitization of user input, which results in a DOM XSS, because it uses the jQuery .html() function to directly append the payload to a dialog.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-21948 | SimplCommerce 1.0.0-rc uses the Bootbox.js library, which allows creation of programmatic dialog boxes using Bootstrap modals. The Bootbox.js library intentionally does not perform any sanitization of user input, which results in a DOM XSS, because it uses the jQuery .html() function to directly append the payload to a dialog. |
References
| Link | Providers |
|---|---|
| https://github.com/simplcommerce/SimplCommerce/issues/969 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:55:10.636Z
Reserved: 2020-12-06T00:00:00.000Z
Link: CVE-2020-29587
No data.
Status : Modified
Published: 2021-01-14T16:15:18.227
Modified: 2024-11-21T05:24:15.890
Link: CVE-2020-29587
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD