CVE-2021-23472
Description
This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
CWE
- (none)
Affected
- n/a / bootstrap-table — v=<1.19.1 [affected]
CVSS
- 3.1 score=3.1 severity=LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
References
- https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 x_refsource_MISC
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 x_refsource_MISC
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 x_refsource_MISC
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 x_refsource_MISC
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 x_refsource_MISC
- https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218 x_refsource_MISC
- https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 x_refsource_MISC
Source
cvelistV5-main/cves/2021/23xxx/CVE-2021-23472.json