-
-
Notifications
You must be signed in to change notification settings - Fork 78.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New 4.6.x version solving CVE-2024-6531 #40765
Comments
Bootstrap v4 has been EOL since 2023-01-01 and won't receive any patches here. You can either pay for support https://www.herodevs.com/support/nes-bootstrap or update to Bootstrap v5 |
Just as @coliff said, the Bootstrap v4 is EOL and there won't be any patch on our side. |
Understood, thanks! |
I'm really annoyed, that bootstrap doesn't want to fix that issue for bootstrap v4. Paying for support isn't an option for many people, upgrading to bootstrap v5 isn't either. So my idea is to create a fork of bootstrap v4 or participate to an already existing one, fixing all upcoming CVEs. |
@simonsystem The vulnerability identified in Bootstrap exposes users to Cross-Site Scripting (XSS) attacks. This issue occurs in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an a tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser. Therefore, it should not affect your page if you are not using the carousel component. |
Prerequisites
Proposal
Create a new 4.6.3 version solving the vulnerability.
Motivation and context
There is a vulnerability affecting from 4.0.0 through 4.6.2 versions:
https://www.cve.org/CVERecord?id=CVE-2024-6531
The text was updated successfully, but these errors were encountered: