This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
References
Link Resource
https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218 Broken Link Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 Exploit Patch Third Party Advisory
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 Exploit Mitigation Third Party Advisory VDB Entry
https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 Exploit Mitigation Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: snyk

Published: 2021-11-03T00:00:00

Updated: 2021-11-19T17:34:34

Reserved: 2021-01-08T00:00:00


Link: CVE-2021-23472

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-11-03T18:15:08.010

Modified: 2023-01-23T17:14:07.267


Link: CVE-2021-23472

JSON object: View

cve-icon Redhat Information

No data.

CWE