Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Vulnerabilities
| CVE |
Severity |
CVSS |
Dependency |
Type |
Fixed in (bootstrap version) |
Remediation Possible** |
Reachability |
| CVE-2020-11023 |
Medium |
6.9 |
jquery-3.2.1.jar |
Transitive |
4.5.0 |
✅ |
|
| CVE-2020-11022 |
Medium |
6.9 |
jquery-3.2.1.jar |
Transitive |
4.5.0 |
✅ |
|
| CVE-2019-8331 |
Medium |
6.1 |
bootstrap-3.3.7.jar |
Direct |
3.4.1 |
✅ |
|
| CVE-2019-11358 |
Medium |
6.1 |
jquery-3.2.1.jar |
Transitive |
4.4.1-1 |
✅ |
|
| CVE-2018-20677 |
Low |
3.7 |
bootstrap-3.3.7.jar |
Direct |
3.4.0 |
✅ |
|
| CVE-2018-20676 |
Low |
3.7 |
bootstrap-3.3.7.jar |
Direct |
3.4.0 |
✅ |
|
| CVE-2018-14042 |
Low |
3.7 |
bootstrap-3.3.7.jar |
Direct |
3.4.0 |
✅ |
|
| CVE-2018-14040 |
Low |
3.7 |
bootstrap-3.3.7.jar |
Direct |
3.4.0 |
✅ |
|
| CVE-2016-10735 |
Low |
3.7 |
bootstrap-3.3.7.jar |
Direct |
3.4.0 |
✅ |
|
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2020-11023
Vulnerable Library - jquery-3.2.1.jar
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- bootstrap-3.3.7.jar (Root Library)
- ❌ jquery-3.2.1.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11023
CVSS 3 Score Details (6.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440
Release Date: 2020-04-29
Fix Resolution (org.webjars:jquery): 3.5.0
Direct dependency fix Resolution (org.webjars:bootstrap): 4.5.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-11022
Vulnerable Library - jquery-3.2.1.jar
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- bootstrap-3.3.7.jar (Root Library)
- ❌ jquery-3.2.1.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11022
CVSS 3 Score Details (6.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
Release Date: 2020-04-29
Fix Resolution (org.webjars:jquery): 3.5.0
Direct dependency fix Resolution (org.webjars:bootstrap): 4.5.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-8331
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- ❌ bootstrap-3.3.7.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
Publish Date: 2019-02-20
URL: CVE-2019-8331
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2019-02-20
Fix Resolution: 3.4.1
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-11358
Vulnerable Library - jquery-3.2.1.jar
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- bootstrap-3.3.7.jar (Root Library)
- ❌ jquery-3.2.1.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.
Publish Date: 2019-04-19
URL: CVE-2019-11358
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358
Release Date: 2019-04-20
Fix Resolution (org.webjars:jquery): 3.4.0
Direct dependency fix Resolution (org.webjars:bootstrap): 4.4.1-1
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2018-20677
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- ❌ bootstrap-3.3.7.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
Publish Date: 2019-01-09
URL: CVE-2018-20677
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677
Release Date: 2019-01-09
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2018-20676
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- ❌ bootstrap-3.3.7.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
Publish Date: 2019-01-09
URL: CVE-2018-20676
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676
Release Date: 2019-01-09
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2018-14042
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- ❌ bootstrap-3.3.7.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
Publish Date: 2018-07-13
URL: CVE-2018-14042
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2018-07-13
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2018-14040
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- ❌ bootstrap-3.3.7.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
Publish Date: 2018-07-13
URL: CVE-2018-14040
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2018-07-13
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2016-10735
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
- ❌ bootstrap-3.3.7.jar (Vulnerable Library)
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
Mend Note: Converted from WS-2018-0021, on 2022-11-08.
Publish Date: 2019-01-09
URL: CVE-2016-10735
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735
Release Date: 2019-01-09
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - jquery-3.2.1.jar
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11023
CVSS 3 Score Details (6.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440
Release Date: 2020-04-29
Fix Resolution (org.webjars:jquery): 3.5.0
Direct dependency fix Resolution (org.webjars:bootstrap): 4.5.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - jquery-3.2.1.jar
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11022
CVSS 3 Score Details (6.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
Release Date: 2020-04-29
Fix Resolution (org.webjars:jquery): 3.5.0
Direct dependency fix Resolution (org.webjars:bootstrap): 4.5.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
Publish Date: 2019-02-20
URL: CVE-2019-8331
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2019-02-20
Fix Resolution: 3.4.1
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - jquery-3.2.1.jar
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.
Publish Date: 2019-04-19
URL: CVE-2019-11358
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358
Release Date: 2019-04-20
Fix Resolution (org.webjars:jquery): 3.4.0
Direct dependency fix Resolution (org.webjars:bootstrap): 4.4.1-1
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
Publish Date: 2019-01-09
URL: CVE-2018-20677
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677
Release Date: 2019-01-09
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
Publish Date: 2019-01-09
URL: CVE-2018-20676
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676
Release Date: 2019-01-09
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
Publish Date: 2018-07-13
URL: CVE-2018-14042
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2018-07-13
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
Publish Date: 2018-07-13
URL: CVE-2018-14040
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2018-07-13
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - bootstrap-3.3.7.jar
WebJar for Bootstrap
Library home page: http://webjars.org
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /webgoat-integration-tests/pom.xml,/webwolf/pom.xml
Dependency Hierarchy:
Found in HEAD commit: f0c1d123bb3375482e903c0febdd18513fb47ec8
Found in base branch: master
Vulnerability Details
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
Mend Note: Converted from WS-2018-0021, on 2022-11-08.
Publish Date: 2019-01-09
URL: CVE-2016-10735
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735
Release Date: 2019-01-09
Fix Resolution: 3.4.0
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.