All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
References
Link | Resource |
---|---|
https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118 | Broken Link |
https://github.com/AllenFang/react-bootstrap-table/issues/2071 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-06-24 15:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-23398
Mitre link : CVE-2021-23398
CVE.ORG link : CVE-2021-23398
JSON object : View
Products Affected
react-bootstrap-table_project
- react-bootstrap-table
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')