CVE-2023-46998

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46998
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46998.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-46998
Aliases
Related
Published
2023-11-07T05:15:13Z
Modified
2025-01-14T12:03:30.848981Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.

References

Affected packages

Debian:11 / libjs-bootbox

Package

Name
libjs-bootbox
Purl
pkg:deb/debian/libjs-bootbox?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.5.2~ds-1
5.5.2~ds-2
5.5.3~ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libjs-bootbox

Package

Name
libjs-bootbox
Purl
pkg:deb/debian/libjs-bootbox?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.5.3~ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libjs-bootbox

Package

Name
libjs-bootbox
Purl
pkg:deb/debian/libjs-bootbox?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.5.3~ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/bootboxjs/bootbox

Affected ranges

Type
GIT
Repo
https://github.com/bootboxjs/bootbox
Events

Affected versions

v3.*

v3.2.0
v3.3.0

v4.*

v4.0.0
v4.1.0
v4.2.0
v4.3.0
v4.4.0

v5.*

v5.0.0
v5.0.1
v5.1.0
v5.1.1
v5.1.3
v5.2.0
v5.3.2
v5.3.3
v5.3.4
v5.4.0
v5.4.1
v5.5.1
v5.5.2
v5.5.3

v6.*

v6.0.0