CVE-2021-21365 – bk2k/bootstrap-package
Package
Manager: composer
Name: bk2k/bootstrap-package
Vulnerable Version: >=7.1.0 <7.1.2 || >=8.0.0 <8.0.8 || >=9.0.0 <9.0.4 || >=9.1.0 <9.1.3 || >=10.0.0 <10.0.10 || >=11.0.0 <11.0.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00342 pctl0.5616
Details
Cross-Site Scripting in Bootstrap Package ### Problem It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. The following templates are affected by the vulnerability: * `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html` * `Resources/Private/Partials/ContentElements/Header/SubHeader.html` Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b). ### Solution Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
Metadata
Created: 2021-04-29T21:51:21Z
Modified: 2021-04-27T19:43:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-p48w-vf3c-rqjx/GHSA-p48w-vf3c-rqjx.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-p48w-vf3c-rqjx
Finding: F008
Auto approve: 1