CVE编号
CVE-2018-14040利用情况
暂无补丁情况
官方补丁披露时间
2018-07-14漏洞描述
Bootstrap是一款使用HTML、CSS和JavaScript开发的开源Web前端框架。Bootstrap 4.1.2之前版本中的collapse data-parent属性存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意的Web脚本或HTML。
解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html | |
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html | |
http://seclists.org/fulldisclosure/2019/May/10 | |
http://seclists.org/fulldisclosure/2019/May/11 | |
http://seclists.org/fulldisclosure/2019/May/13 | |
https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/ | |
https://github.com/twbs/bootstrap/issues/26423 | |
https://github.com/twbs/bootstrap/issues/26625 | |
https://github.com/twbs/bootstrap/pull/26630 | |
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d... | |
https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160... | |
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a... | |
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34... | |
https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc... | |
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2... | |
https://lists.debian.org/debian-lts-announce/2018/08/msg00027.html | |
https://seclists.org/bugtraq/2019/May/18 | |
https://www.oracle.com/security-alerts/cpuApr2021.html | |
https://www.tenable.com/security/tns-2021-14 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | getbootstrap | bootstrap | * |
Up to (excluding) 3.4.0 |
|||||
运行在以下环境 | |||||||||
应用 | getbootstrap | bootstrap | * |
From (including) 4.0.0 |
Up to (excluding) 4.1.2 |
||||
运行在以下环境 | |||||||||
应用 | getbootstrap | bootstrap | 4.0.0 | - | |||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | ipa | * |
Up to (excluding) 4.6.8-5.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon linux_2 | ipa | * |
Up to (excluding) 4.6.8-5.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | ipa | * |
Up to (excluding) 4.6.8-5.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | ipa | * |
Up to (excluding) 4.8.7-12.module+el8.3.0+8222+c1bff54a |
|||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_8 | ipa | * |
Up to (excluding) 3.2.0+dfsg-1+deb7u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | ipa | * |
Up to (excluding) 3.3.7+dfsg-2+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_7 | ipa | * |
Up to (excluding) 4.6.8-5.0.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | ipa | * |
Up to (excluding) 4.6.8-5.0.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | ipa | * |
Up to (excluding) 0.6.0-3.module+el8.3.0+7868+2151076c |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | ipa-client | * |
Up to (excluding) 0:4.6.8-5.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | ipa | * |
Up to (excluding) 4.8.7-12.module+el8.3.0+8222+c1bff54a |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 越权影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...