First published: Thu Feb 14 2019(Updated: )
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ovirt-web-ui | <0:1.6.7-1.el8e | 0:1.6.7-1.el8e |
redhat/ovirt-engine-ui-extensions | <0:1.2.5-1.el8e | 0:1.2.5-1.el8e |
redhat/nodejs-bootstrap-select | <1.13.6 | 1.13.6 |
nuget/bootstrap-select | <1.13.6 | 1.13.6 |
npm/bootstrap-select | <1.13.6 | 1.13.6 |
Easy!Appointments | <1.13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20921 is classified as a medium severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To fix CVE-2019-20921, update to bootstrap-select version 1.13.6 or later.
CVE-2019-20921 affects applications using bootstrap-select versions prior to 1.13.6, particularly those using the library for handling dropdowns.
In the context of CVE-2019-20921, Cross-Site Scripting (XSS) allows attackers to execute arbitrary JavaScript in the user's browser, potentially compromising user data.
Users of applications that incorporate vulnerable versions of bootstrap-select are impacted by CVE-2019-20921.