-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS scripting in bootstrap <3.3.7 #4603
Comments
Thanks for reporting this, @pbr0ck3r. Is this an issue that is actually affecting us or is this a theoretical issue because we use an affected dependency but not in a way that allows exploitation of the issue? |
It does not directly affect graylog core code base. But is a theoretical issue. If anyone where to have a plugin containing similar to the following code pointing to a malicious site, or scraping data.
It is suggested to update bootstrap to fix this vulnerability. |
@pbr0ck3r Thanks for providing these details! Right now, we're blocked until Bootstrap 3.4.0 has been released: twbs/bootstrap#25679 |
Expected Behavior
Don't allow XSS.
Current Behavior
Bootstrap 3.3.7 is are vulnerable to Cross-Site Scripting (XSS) attacks via the data-target attribute.
https://snyk.io/vuln/npm:bootstrap:20160627
Fixed in: twbs/bootstrap#23687
Possible Solution
Steps to Reproduce (for bugs)
Context
Your Environment
The text was updated successfully, but these errors were encountered: