Description
This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
Remediation
References
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688
https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689
https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690
https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597
Related Vulnerabilities
CVE-2020-15231 Vulnerability in maven package org.mapfish.print:print-lib
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-dbcp-service
CVE-2022-45397 Vulnerability in maven package org.jenkins-ci.plugins:osf-builder-suite-xml-linter
CVE-2020-26302 Vulnerability in maven package org.webjars.bowergithub.arasatasaygin:is.js
CVE-2021-38384 Vulnerability in npm package serverless-offline