You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /hapi-fhir-cli/hapi-fhir-cli-app/pom.xml
Path to vulnerable library: /hapi-fhir-cli/hapi-fhir-cli-app/pom.xml,/hapi-fhir-docs/pom.xml,/hapi-fhir-testpage-overlay/pom.xml,/hapi-fhir-jpaserver-uhnfhirtest/pom.xml
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
CVE-2024-6531 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-4.5.2.jar
WebJar for bootstrap
Library home page: https://www.webjars.org
Path to dependency file: /hapi-fhir-cli/hapi-fhir-cli-app/pom.xml
Path to vulnerable library: /hapi-fhir-cli/hapi-fhir-cli-app/pom.xml,/hapi-fhir-docs/pom.xml,/hapi-fhir-testpage-overlay/pom.xml,/hapi-fhir-jpaserver-uhnfhirtest/pom.xml
Dependency Hierarchy:
Found in HEAD commit: b59f2d05a7d0fd10c7b03bb6f0ebf97757172a71
Found in base branch: master
Vulnerability Details
A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
Publish Date: 2024-07-11
URL: CVE-2024-6531
CVSS 3 Score Details (6.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-vc8w-jr9v-vj7f
Release Date: 2024-07-11
Fix Resolution: 5.0.0-alpha1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: