This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 05:51
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218 - Broken Link, Third Party Advisory | |
| References | () https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 - Exploit, Patch, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | () https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 4.3
         v3 : 3.1  | 
28 Nov 2021, 23:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 - Exploit, Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:bootstrap_table_project:bootstrap_table:*:*:*:*:*:*:*:* | |
| CWE | CWE-843 | 
19 Nov 2021, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set. | |
| CPE | cpe:2.3:a:bootstrap_table_project:bootstrap_table:-:*:*:*:*:*:*:* | |
| CWE | CWE-79 | |
| References | 
        
        
  | 
|
| References | (MISC) https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218 - Broken Link, Third Party Advisory | |
| References | (MISC) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | (MISC) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | (MISC) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | (MISC) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| References | (MISC) https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 - Exploit, Mitigation, Third Party Advisory, VDB Entry | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 4.3
         v3 : 6.1  | 
03 Nov 2021, 18:22
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-11-03 18:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23472
Mitre link : CVE-2021-23472
CVE.ORG link : CVE-2021-23472
JSON object : View
Products Affected
                bootstrap-table
- bootstrap_table
 
CWE
                
                    
                        
                        CWE-843
                        
            Access of Resource Using Incompatible Type ('Type Confusion')
