CVE-2016-10735

In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
References
Link Resource
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ Release Notes Third Party Advisory
https://github.com/twbs/bootstrap/issues/20184 Exploit Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/pull/23679 Third Party Advisory
https://github.com/twbs/bootstrap/pull/23687 Patch Third Party Advisory
https://github.com/twbs/bootstrap/pull/26460 Third Party Advisory
https://www.tenable.com/security/tns-2021-14
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ Release Notes Third Party Advisory
https://github.com/twbs/bootstrap/issues/20184 Exploit Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/pull/23679 Third Party Advisory
https://github.com/twbs/bootstrap/pull/23687 Patch Third Party Advisory
https://github.com/twbs/bootstrap/pull/26460 Third Party Advisory
https://www.tenable.com/security/tns-2021-14
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*
cpe:2.3:a:getbootstrap:bootstrap:4.0.0:beta:*:*:*:*:*:*

History

21 Nov 2024, 02:44

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHBA-2019:1076 - () https://access.redhat.com/errata/RHBA-2019:1076 -
References () https://access.redhat.com/errata/RHBA-2019:1570 - () https://access.redhat.com/errata/RHBA-2019:1570 -
References () https://access.redhat.com/errata/RHSA-2019:1456 - () https://access.redhat.com/errata/RHSA-2019:1456 -
References () https://access.redhat.com/errata/RHSA-2019:3023 - () https://access.redhat.com/errata/RHSA-2019:3023 -
References () https://access.redhat.com/errata/RHSA-2020:0132 - () https://access.redhat.com/errata/RHSA-2020:0132 -
References () https://access.redhat.com/errata/RHSA-2020:0133 - () https://access.redhat.com/errata/RHSA-2020:0133 -
References () https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ - Release Notes, Third Party Advisory () https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ - Release Notes, Third Party Advisory
References () https://github.com/twbs/bootstrap/issues/20184 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/twbs/bootstrap/issues/20184 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 - Issue Tracking, Third Party Advisory () https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 - Issue Tracking, Third Party Advisory
References () https://github.com/twbs/bootstrap/pull/23679 - Third Party Advisory () https://github.com/twbs/bootstrap/pull/23679 - Third Party Advisory
References () https://github.com/twbs/bootstrap/pull/23687 - Patch, Third Party Advisory () https://github.com/twbs/bootstrap/pull/23687 - Patch, Third Party Advisory
References () https://github.com/twbs/bootstrap/pull/26460 - Third Party Advisory () https://github.com/twbs/bootstrap/pull/26460 - Third Party Advisory
References () https://www.tenable.com/security/tns-2021-14 - () https://www.tenable.com/security/tns-2021-14 -

Information

Published : 2019-01-09 05:29

Updated : 2024-11-21 02:44


NVD link : CVE-2016-10735

Mitre link : CVE-2016-10735

CVE.ORG link : CVE-2016-10735


JSON object : View

Products Affected

getbootstrap

  • bootstrap
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')