First published: Mon Feb 11 2019(Updated: )
A cross-site scripting vulnerability was discovered in bootstrap. If an attacker could control the data given to tooltip or popover, they could inject HTML or Javascript into the rendered page when tooltip or popover events fired.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <0:4.6.8-5.el7 | 0:4.6.8-5.el7 |
redhat/eap7-hal-console | <0:3.3.16-1.Final_redhat_00001.1.el8ea | 0:3.3.16-1.Final_redhat_00001.1.el8ea |
redhat/eap7-hal-console | <0:3.3.16-1.Final_redhat_00001.1.el9ea | 0:3.3.16-1.Final_redhat_00001.1.el9ea |
redhat/eap7-hal-console | <0:3.3.16-1.Final_redhat_00001.1.el7ea | 0:3.3.16-1.Final_redhat_00001.1.el7ea |
redhat/ovirt-engine-ui-extensions | <0:1.0.10-1.el7e | 0:1.0.10-1.el7e |
redhat/ovirt-web-ui | <0:1.6.0-1.el7e | 0:1.6.0-1.el7e |
redhat/ovirt-engine-api-explorer | <0:0.0.6-1.el8e | 0:0.0.6-1.el8e |
redhat/bootstrap | <4.3.1 | 4.3.1 |
composer/twbs/bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
composer/twbs/bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
maven/org.webjars:bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
maven/org.webjars:bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
rubygems/twitter-bootstrap-rails | <=5.0.0 | |
npm/bootstrap-sass | >=3.0.0<3.4.1 | 3.4.1 |
npm/bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
npm/bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
nuget/bootstrap.sass | <4.3.1 | 4.3.1 |
nuget/bootstrap | >=3.0.0<3.4.1 | 3.4.1 |
nuget/bootstrap | >=4.0.0<4.3.1 | 4.3.1 |
nuget/Bootstrap.Less | >=3.0.0<3.4.1 | 3.4.1 |
rubygems/bootstrap-sass | >=3.0.0<3.4.1 | 3.4.1 |
rubygems/bootstrap | <4.3.1 | 4.3.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
Twitter Bootstrap | <3.4.1 | |
Twitter Bootstrap | >=4.3.0<4.3.1 | |
F5 Access Policy Manager | >=12.1.0<12.1.5.1 | |
F5 Access Policy Manager | >=13.0.0<13.1.3.4 | |
F5 Access Policy Manager | >=14.0.0<14.1.2.5 | |
F5 Access Policy Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Analytics | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Analytics | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Analytics | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Analytics | >=15.0.0<15.1.0 | |
f5 big-ip application acceleration manager | >=12.1.0<12.1.5.1 | |
f5 big-ip application acceleration manager | >=13.0.0<13.1.3.4 | |
f5 big-ip application acceleration manager | >=14.0.0<14.1.2.5 | |
f5 big-ip application acceleration manager | >=15.0.0<15.1.0 | |
F5 Application Security Manager | >=12.1.0<12.1.5.1 | |
F5 Application Security Manager | >=13.0.0<13.1.3.4 | |
F5 Application Security Manager | >=14.0.0<14.1.2.5 | |
F5 Application Security Manager | >=15.0.0<15.1.0 | |
f5 big-ip domain name system | >=12.1.0<12.1.5.1 | |
f5 big-ip domain name system | >=13.0.0<13.1.3.4 | |
f5 big-ip domain name system | >=14.0.0<14.1.2.5 | |
f5 big-ip domain name system | >=15.0.0<15.1.0 | |
F5 BIG-IP Edge Gateway | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Edge Gateway | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Edge Gateway | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Edge Gateway | >=15.0.0<15.1.0 | |
F5 BIG-IP fraud protection services | >=12.1.0<12.1.5.1 | |
F5 BIG-IP fraud protection services | >=13.0.0<13.1.3.4 | |
F5 BIG-IP fraud protection services | >=14.0.0<14.1.2.5 | |
F5 BIG-IP fraud protection services | >=15.0.0<15.1.0 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Global Traffic Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Global Traffic Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP | >=12.1.0<12.1.5.1 | |
F5 BIG-IP | >=13.0.0<13.1.3.4 | |
F5 BIG-IP | >=14.0.0<14.1.2.5 | |
F5 BIG-IP | >=15.0.0<15.1.0 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Local Traffic Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Local Traffic Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<12.1.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=13.0.0<13.1.3.4 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<14.1.2.5 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP WebAccelerator | >=12.1.0<12.1.5.1 | |
F5 BIG-IP WebAccelerator | >=13.0.0<13.1.3.4 | |
F5 BIG-IP WebAccelerator | >=14.0.0<14.1.2.5 | |
F5 BIG-IP WebAccelerator | >=15.0.0<15.1.0 | |
Red Hat Enterprise Virtualization Manager | =4.3 | |
tenable tenable.sc | <5.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-8331 is medium.
Bootstrap versions before 3.4.1 and 4.3.x before 4.3.1 are affected by CVE-2019-8331.
CVE-2019-8331 allows a remote attacker to execute script in a victim's web browser within the security context of the hosting website.
To fix CVE-2019-8331, you need to upgrade to Bootstrap version 3.4.1 or 4.3.1.
More information about CVE-2019-8331 can be found at the following references: [link1](https://exchange.xforce.ibmcloud.com/vulnerabilities/157409), [link2](https://www.ibm.com/support/pages/node/6570957), [link3](https://github.com/twbs/bootstrap/releases/tag/v4.3.1).