CVE-2021-23472

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23472
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23472.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-23472
Aliases
Related
  • SNYK-JAVA-ORGWEBJARS-1910690
  • SNYK-JAVA-ORGWEBJARSBOWER-1910689
  • SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687
  • SNYK-JAVA-ORGWEBJARSNPM-1910688
  • SNYK-JS-BOOTSTRAPTABLE-1657597
  • UBUNTU-CVE-2021-23472
Published
2021-11-03T18:15:08Z
Modified
2025-01-14T09:12:06.380320Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.

References

Affected packages

Git / github.com/wenzhixin/bootstrap-table

Affected ranges

Type
GIT
Repo
https://github.com/wenzhixin/bootstrap-table
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.10.0
1.10.1
1.11.0
1.11.1
1.12.0
1.12.1
1.12.2
1.13.0
1.13.1
1.13.2
1.13.3
1.13.4
1.13.5
1.14.1
1.14.2
1.15.2
1.15.3
1.15.4
1.15.5
1.16.0
1.17.0
1.17.1
1.18.0
1.18.1
1.18.2
1.18.3
1.19.0
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.3.0
1.4.0
1.5.0
1.6.0
1.7.0
1.8.0
1.8.1
1.9.0
1.9.1