Description
Vulnerable Library - bootstrap-4.3.1.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.3.1/js/bootstrap.min.js
Path to vulnerable library: /DotNetWebhookCodeSnippets/wwwroot/lib/bootstrap/dist/js/bootstrap.min.js
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Vulnerabilities
CVE | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (bootstrap version) | Remediation Possible** | Reachability | |
---|---|---|---|---|---|---|---|---|---|
CVE-2024-6531 | 6.4 | Not Defined | 0.2% | bootstrap-4.3.1.min.js | Direct | zeevx/lara-termii - 0.1.1 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-6531
Vulnerable Library - bootstrap-4.3.1.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.3.1/js/bootstrap.min.js
Path to vulnerable library: /DotNetWebhookCodeSnippets/wwwroot/lib/bootstrap/dist/js/bootstrap.min.js
Dependency Hierarchy:
- ❌ bootstrap-4.3.1.min.js (Vulnerable Library)
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Found in base branch: master
Vulnerability Details
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
Publish Date: 2024-07-11
URL: CVE-2024-6531
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.2%
CVSS 3 Score Details (6.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-6531
Release Date: 2024-07-11
Fix Resolution: zeevx/lara-termii - 0.1.1