First published: Mon Feb 11 2019(Updated: )
A cross-site scripting vulnerability was discovered in bootstrap. If an attacker could control the data given to tooltip or popover, they could inject HTML or Javascript into the rendered page when tooltip or popover events fired.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <0:4.6.8-5.el7 | 0:4.6.8-5.el7 |
redhat/eap7-hal-console | <0:3.3.16-1.Final_redhat_00001.1.el8ea | 0:3.3.16-1.Final_redhat_00001.1.el8ea |
redhat/eap7-hal-console | <0:3.3.16-1.Final_redhat_00001.1.el9ea | 0:3.3.16-1.Final_redhat_00001.1.el9ea |
redhat/eap7-hal-console | <0:3.3.16-1.Final_redhat_00001.1.el7ea | 0:3.3.16-1.Final_redhat_00001.1.el7ea |
redhat/ovirt-engine-ui-extensions | <0:1.0.10-1.el7e | 0:1.0.10-1.el7e |
redhat/ovirt-web-ui | <0:1.6.0-1.el7e | 0:1.6.0-1.el7e |
redhat/ovirt-engine-api-explorer | <0:0.0.6-1.el8e | 0:0.0.6-1.el8e |
Getbootstrap Bootstrap | <3.4.1 | |
Getbootstrap Bootstrap | >=4.3.0<4.3.1 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Access Policy Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Analytics | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Analytics | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Analytics | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Analytics | >=15.0.0<15.1.0 | |
F5 Big-ip Application Acceleration Manager | >=12.1.0<12.1.5.1 | |
F5 Big-ip Application Acceleration Manager | >=13.0.0<13.1.3.4 | |
F5 Big-ip Application Acceleration Manager | >=14.0.0<14.1.2.5 | |
F5 Big-ip Application Acceleration Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Application Security Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Application Security Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Application Security Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Application Security Manager | >=15.0.0<15.1.0 | |
F5 Big-ip Domain Name System | >=12.1.0<12.1.5.1 | |
F5 Big-ip Domain Name System | >=13.0.0<13.1.3.4 | |
F5 Big-ip Domain Name System | >=14.0.0<14.1.2.5 | |
F5 Big-ip Domain Name System | >=15.0.0<15.1.0 | |
F5 Big-ip Edge Gateway | >=12.1.0<12.1.5.1 | |
F5 Big-ip Edge Gateway | >=13.0.0<13.1.3.4 | |
F5 Big-ip Edge Gateway | >=14.0.0<14.1.2.5 | |
F5 Big-ip Edge Gateway | >=15.0.0<15.1.0 | |
F5 Big-ip Fraud Protection Service | >=12.1.0<12.1.5.1 | |
F5 Big-ip Fraud Protection Service | >=13.0.0<13.1.3.4 | |
F5 Big-ip Fraud Protection Service | >=14.0.0<14.1.2.5 | |
F5 Big-ip Fraud Protection Service | >=15.0.0<15.1.0 | |
F5 Big-ip Global Traffic Manager | >=12.1.0<12.1.5.1 | |
F5 Big-ip Global Traffic Manager | >=13.0.0<13.1.3.4 | |
F5 Big-ip Global Traffic Manager | >=14.0.0<14.1.2.5 | |
F5 Big-ip Global Traffic Manager | >=15.0.0<15.1.0 | |
F5 Big-ip Link Controller | >=12.1.0<12.1.5.1 | |
F5 Big-ip Link Controller | >=13.0.0<13.1.3.4 | |
F5 Big-ip Link Controller | >=14.0.0<14.1.2.5 | |
F5 Big-ip Link Controller | >=15.0.0<15.1.0 | |
F5 Big-ip Local Traffic Manager | >=12.1.0<12.1.5.1 | |
F5 Big-ip Local Traffic Manager | >=13.0.0<13.1.3.4 | |
F5 Big-ip Local Traffic Manager | >=14.0.0<14.1.2.5 | |
F5 Big-ip Local Traffic Manager | >=15.0.0<15.1.0 | |
F5 Big-ip Policy Enforcement Manager | >=12.1.0<12.1.5.1 | |
F5 Big-ip Policy Enforcement Manager | >=13.0.0<13.1.3.4 | |
F5 Big-ip Policy Enforcement Manager | >=14.0.0<14.1.2.5 | |
F5 Big-ip Policy Enforcement Manager | >=15.0.0<15.1.0 | |
F5 Big-ip Webaccelerator | >=12.1.0<12.1.5.1 | |
F5 Big-ip Webaccelerator | >=13.0.0<13.1.3.4 | |
F5 Big-ip Webaccelerator | >=14.0.0<14.1.2.5 | |
F5 Big-ip Webaccelerator | >=15.0.0<15.1.0 | |
Redhat Virtualization Manager | =4.3 | |
Tenable Tenable.sc | <5.19.0 | |
redhat/bootstrap | <4.3.1 | 4.3.1 |
composer/twbs/bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
composer/twbs/bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
maven/org.webjars:bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
maven/org.webjars:bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
rubygems/twitter-bootstrap-rails | <=5.0.0 | |
npm/bootstrap-sass | >=3.0.0<3.4.1 | 3.4.1 |
npm/bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
npm/bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
nuget/bootstrap.sass | <4.3.1 | 4.3.1 |
nuget/bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
nuget/bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
nuget/Bootstrap.Less | >=3.0.0<3.4.1 | 3.4.1 |
rubygems/bootstrap-sass | >=3.0.0<3.4.1 | 3.4.1 |
rubygems/bootstrap | <4.3.1 | 4.3.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-8331 is medium.
Bootstrap versions before 3.4.1 and 4.3.x before 4.3.1 are affected by CVE-2019-8331.
CVE-2019-8331 allows a remote attacker to execute script in a victim's web browser within the security context of the hosting website.
To fix CVE-2019-8331, you need to upgrade to Bootstrap version 3.4.1 or 4.3.1.
More information about CVE-2019-8331 can be found at the following references: [link1](https://exchange.xforce.ibmcloud.com/vulnerabilities/157409), [link2](https://www.ibm.com/support/pages/node/6570957), [link3](https://github.com/twbs/bootstrap/releases/tag/v4.3.1).