First published: Thu Jul 11 2024(Updated: )
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an <a> tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
Credit: 36c7be3b-2937-45df-85ea-ca7133ea542c 36c7be3b-2937-45df-85ea-ca7133ea542c
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.webjars.npm:bootstrap | >=4.0.0<=4.6.2 | 5.0.0 |
maven/org.webjars:bootstrap | >=4.0.0<=4.6.2 | 5.0.0 |
composer/twbs/bootstrap | >=4.0.0<=4.6.2 | 5.0.0 |
nuget/bootstrap.sass | >=4.0.0<=4.6.2 | 5.0.0 |
nuget/bootstrap | >=4.0.0<=4.6.2 | 5.0.0 |
rubygems/bootstrap | >=4.0.0<=4.6.2 | 5.0.0 |
npm/bootstrap | >=4.0.0<=4.6.2 | 5.0.0 |
Bootstrap | >=4.0.0<=4.6.2 | |
Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6531 is classified as a medium severity vulnerability due to the risk of Cross-Site Scripting (XSS) attacks.
To fix CVE-2024-6531, update Bootstrap to version 5.0.0 or later.
CVE-2024-6531 affects the carousel component in Bootstrap where the data-slide and data-slide-to attributes are vulnerable.
CVE-2024-6531 can be exploited through inadequate sanitization of the href attribute in <a> tags within the carousel component.
Bootstrap versions from 4.0.0 to 4.6.2 are vulnerable to CVE-2024-6531.