CVE-2024-6484:
Bootstrap Cross-Site Scripting (XSS) vulnerability
6.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.13059%
CWE
Published
7/11/2024
Updated
1/31/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
bootstrap | npm | >= 2.0.0, <= 3.4.1 | |
bootstrap | rubygems | >= 2.0.0, <= 3.4.1 | |
bootstrap | nuget | >= 2.0.0, <= 3.4.1 | |
bootstrap-sass | rubygems | >= 2.0.0, <= 3.4.1 | |
bootstrap.sass | nuget | >= 2.0.0, <= 3.4.1 | |
twbs/bootstrap | composer | >= 2.0.0, <= 3.4.1 | |
org.webjars:bootstrap | maven | >= 2.0.0, <= 3.4.1 | |
org.webjars.npm:bootstrap | maven | >= 2.0.0, <= 3.4.1 | |
bootstrap-sass | npm | >= 2.0.0, <= 3.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Bootstrap's carousel component handling of anchor elements with data-slide/data-slide-to attributes. When data-target is missing, the code falls back to using the href attribute without proper sanitization. The Carousel.prototype.handle
and associated click handlers are responsible for processing these navigation events. These functions fail to properly validate()
that the href value contains only a valid carousel selector, allowing execution of arbitrary JavaScript through javascript: URIs. The HeroDevs reproduction demonstrates this occurs in the carousel event handling logic, and the CWE-79 classification confirms this is an input sanitization failure in web page generation.