CVE-2024-6531 - A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks #40682
Replies: 2 comments 9 replies
-
Hi @hashaghate |
Beta Was this translation helpful? Give feedback.
-
I don't mean to necro bump the discussion but this seems to be the most appropriate location to share my research into this CVE. This has been bugging me for quite a while now as it has been appearing in the software composition analysis (NexusIQ) scans. The existing Bootstrap source code (v3/v4/v5) already checks if the value in the "href" or "data-target" ("data-bs-target" for v5) attribute points to a target with the carousel class. And if so, blocks the click event from propagating further. And if not, returns the event back to the browser. Reviewing the PoC code as seen at https://www.herodevs.com/vulnerability-directory/cve-2024-6484?bootstrap-nes It is not setup correctly to either use href="#myCarousel" or data-target="#myCarousel" to point to an element with the carousel class. If you add data-target="#myCarousel" to the PoC at https://codepen.io/Trey-McCallie/pen/NWZKERe as follows, then the XSS won't be triggered and the carousel moves to the previous slide as expected
Blocking all the By returning the legitimate click actions back to the browser to process seems to be the most graceful approach to not break anything. Why is this an issue in the first place? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi All,
In our ASP.NET application, we are using Bootstrap version 5.3.1
But NexusScan flagged out vulnerability CVE-2024-6531 and recommendation is given as
"There is no non-vulnerable upgrade path for this component/package. We recommend investigating alternative components or a potential mitigating control."
Please share your thoughs and suggestions on how to fix this.
Beta Was this translation helpful? Give feedback.
All reactions