CVE-2018-20677

In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
References
Link Resource
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ Release Notes Vendor Advisory
https://github.com/twbs/bootstrap/issues/27045 Exploit Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/pull/27047 Patch Third Party Advisory
https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
https://www.tenable.com/security/tns-2021-14
https://access.redhat.com/errata/RHBA-2019:1076
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2020:0132
https://access.redhat.com/errata/RHSA-2020:0133
https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ Release Notes Vendor Advisory
https://github.com/twbs/bootstrap/issues/27045 Exploit Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 Issue Tracking Third Party Advisory
https://github.com/twbs/bootstrap/pull/27047 Patch Third Party Advisory
https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
https://www.tenable.com/security/tns-2021-14
Configurations

Configuration 1 (hide)

cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHBA-2019:1076 - () https://access.redhat.com/errata/RHBA-2019:1076 -
References () https://access.redhat.com/errata/RHBA-2019:1570 - () https://access.redhat.com/errata/RHBA-2019:1570 -
References () https://access.redhat.com/errata/RHSA-2019:1456 - () https://access.redhat.com/errata/RHSA-2019:1456 -
References () https://access.redhat.com/errata/RHSA-2019:3023 - () https://access.redhat.com/errata/RHSA-2019:3023 -
References () https://access.redhat.com/errata/RHSA-2020:0132 - () https://access.redhat.com/errata/RHSA-2020:0132 -
References () https://access.redhat.com/errata/RHSA-2020:0133 - () https://access.redhat.com/errata/RHSA-2020:0133 -
References () https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ - Release Notes, Vendor Advisory () https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ - Release Notes, Vendor Advisory
References () https://github.com/twbs/bootstrap/issues/27045 - Issue Tracking, Exploit, Third Party Advisory () https://github.com/twbs/bootstrap/issues/27045 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 - Issue Tracking, Third Party Advisory () https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 - Issue Tracking, Third Party Advisory
References () https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 - Issue Tracking, Third Party Advisory () https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 - Issue Tracking, Third Party Advisory
References () https://github.com/twbs/bootstrap/pull/27047 - Patch, Third Party Advisory () https://github.com/twbs/bootstrap/pull/27047 - Patch, Third Party Advisory
References () https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E - () https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E -
References () https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E - () https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E -
References () https://www.tenable.com/security/tns-2021-14 - () https://www.tenable.com/security/tns-2021-14 -

07 Nov 2023, 02:56

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'name': '[superset-dev] 20190926 Re: [VOTE] Release Superset 0.34.1 based on Superset 0.34.1rc1', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'name': '[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E -
  • () https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E -

Information

Published : 2019-01-09 05:29

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20677

Mitre link : CVE-2018-20677

CVE.ORG link : CVE-2018-20677


JSON object : View

Products Affected

getbootstrap

  • bootstrap
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')