CVE-2023-46998 - Medium Severity Vulnerability
Vulnerable Library - bootbox-5.4.0.tgz
Wrappers for JavaScript alert(), confirm(), prompt(), and other flexible dialogs using the Bootstrap framework
Library home page: https://registry.npmjs.org/bootbox/-/bootbox-5.4.0.tgz
Path to dependency file: /passhweb/app/static/package.json
Path to vulnerable library: /passhweb/app/static/node_modules/bootbox/package.json
Dependency Hierarchy:
- ❌ bootbox-5.4.0.tgz (Vulnerable Library)
Found in HEAD commit: b0f7c98d88f4f0ef7aa1b834668853b7092da5a4
Found in base branch: master
Vulnerability Details
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2023-11-07
URL: CVE-2023-46998
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Step up your Open Source Security Game with Mend here
CVE-2023-46998 - Medium Severity Vulnerability
Wrappers for JavaScript alert(), confirm(), prompt(), and other flexible dialogs using the Bootstrap framework
Library home page: https://registry.npmjs.org/bootbox/-/bootbox-5.4.0.tgz
Path to dependency file: /passhweb/app/static/package.json
Path to vulnerable library: /passhweb/app/static/node_modules/bootbox/package.json
Dependency Hierarchy:
Found in HEAD commit: b0f7c98d88f4f0ef7aa1b834668853b7092da5a4
Found in base branch: master
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2023-11-07
URL: CVE-2023-46998
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Step up your Open Source Security Game with Mend here