Miggo Logo

CVE-2018-14042: Bootstrap Cross-Site Scripting Vulnerability in Tooltip Data-Container Property

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.77441%
Published
9/13/2018
Updated
8/5/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
bootstraprubygems>= 4.0.0, < 4.1.24.1.2
bootstraprubygems>= 2.3.0, < 3.4.03.4.0
bootstrapnpm>= 4.0.0, < 4.1.24.1.2
bootstrapnpm>= 2.3.0, < 3.4.03.4.0
org.webjars:bootstrapmaven>= 4.0.0, < 4.1.24.1.2
org.webjars:bootstrapmaven>= 2.3.0, < 3.4.03.4.0
twbs/bootstrapcomposer>= 4.0.0, < 4.1.24.1.2
twbs/bootstrapcomposer>= 2.3.0, < 3.4.03.4.0
bootstrapnuget>= 4.0.0, < 4.1.24.1.2
bootstrapnuget>= 2.3.0, < 3.4.03.4.0
bootstrap-sassrubygems>= 2.3.0, < 3.4.03.4.0
bootstrap-sassnpm>= 2.0.4, < 3.4.03.4.0
bootstrap.sassnuget>= 4.0.0, < 4.1.24.1.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub commit 2d90d36 shows the fix changed container selection from $(config.container) to $(document).find(config.container). This indicates the original code directly evaluated user-controlled 'data-container' input as a jQuery selector, enabling XSS if the value contained malicious HTML. The vulnerability is specifically in how the container parameter was processed in the Tooltip component's initialization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *ootstr*p st*rtin* in v*rsion *.*.* *n* prior to v*rsions *.*.* *n* *.*.*, XSS is possi*l* in t** **t*-*ont*in*r prop*rty o* tooltip. T*is is simil*r to *V*-****-*****.

Reasoning

T** *it*u* *ommit ******* s*ows t** *ix ***n*** *ont*in*r s*l**tion *rom $(*on*i*.*ont*in*r) to $(*o*um*nt).*in*(*on*i*.*ont*in*r). T*is in*i**t*s t** ori*in*l *o** *ir**tly *v*lu*t** us*r-*ontroll** '**t*-*ont*in*r' input *s * jQu*ry s*l**tor, *n**l