CVE-2021-23472

This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
References
Link Resource
https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218 Broken Link Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 Exploit Patch Third Party Advisory
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 Exploit Mitigation Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:bootstrap-table:bootstrap_table:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-11-03 18:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-23472

Mitre link : CVE-2021-23472

CVE.ORG link : CVE-2021-23472


JSON object : View

Products Affected

bootstrap-table

  • bootstrap_table
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')