CVE-2024-6484: Withdrawn Advisory: Bootstrap Cross-Site Scripting (XSS) vulnerability
(updated )
Withdrawn Advisory
This advisory has been withdrawn because it was determined to not be a vulnerability in Bootstrap. From the CVE:
This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded.
Original Description
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide
and data-slide-to
attributes can be exploited through the href attribute of an <a>
tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim’s browser.
References
- github.com/advisories/GHSA-9mvj-f7w8-pvh2
- github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml
- github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml
- github.com/twbs/bootstrap
- nvd.nist.gov/vuln/detail/CVE-2024-6484
- www.herodevs.com/vulnerability-directory/cve-2024-6484
Code Behaviors & Features
Detect and mitigate CVE-2024-6484 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →