Bootstrap, a widely popular front-end framework, showcases a significant transformation between version 0.0.2 and 3.1.1. The initial version, 0.0.2, released in 2011, acted as a simple scaffolding tool for Node.js applications, offering basic defaults and relying on the 'commander' package for command-line interface functionalities. In contrast, version 3.1.1, from 2014, represents a mature and robust CSS, JS, and HTML framework for developing responsive, mobile-first web applications.
The later version embraced a comprehensive suite of Grunt-based development dependencies, including tools for minification, linting, concatenation, and more, streamlining the development workflow. Version 3.1.1 also adopted the MIT license, signaling a commitment to open-source principles. The repository shifted to the official Bootstrap GitHub, indicating the project reached stability.
For developers, the jump from version 0.0.2 to 3.1.1 marks a paradigm shift. While the earliest version offered a minimal setup for Node.js, the later version provides a full-fledged framework with extensive documentation and a large community. Developers gain access to a responsive grid system, pre-built components, and customizable styles.
All the vulnerabilities related to the version 3.1.1 of the package
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
Bootstrap vulnerable to Cross-Site Scripting (XSS)
In Bootstrap starting in version 2.3.0 and prior to 3.4.0, as well as 4.x before 4.1.2, XSS is possible in the collapse data-parent attribute.
Bootstrap Cross-site Scripting vulnerability
In Bootstrap 2.x from 2.0.4, 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041.
See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
Bootstrap Cross-site Scripting vulnerability
In Bootstrap starting in version 2.3.0 and prior to versions 3.4.0 and 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.
bootstrap Cross-site Scripting vulnerability
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
Bootstrap Vulnerable to Cross-Site Scripting
Versions of bootstrap
prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The data-template
attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript.
For bootstrap
4.x upgrade to 4.3.1 or later.
For bootstrap
3.x upgrade to 3.4.1 or later.
Bootstrap Cross-Site Scripting (XSS) vulnerability for data-* attributes
A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.
Bootstrap Cross-Site Scripting (XSS) vulnerability
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide
and data-slide-to
attributes can be exploited through the href attribute of an <a>
tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.