Description
This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2370 | This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set. |
Github GHSA |
GHSA-mw6q-98mp-g8g8 | Cross-site Scripting in bootstrap-table |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T02:56:45.202Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23472
No data.
Status : Modified
Published: 2021-11-03T18:15:08.010
Modified: 2024-11-21T05:51:47.840
Link: CVE-2021-23472
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA