Name | CVE-2022-1726 |
Description | Bootstrap Tables XSS vulnerability with Table Export plug-in when exportOptions: htmlContent is true in GitHub repository wenzhixin/bootstrap-table prior to 1.20.2. Disclosing session cookies, disclosing secure session data, exfiltrating data to third-parties. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
zoneminder (PTS) | bullseye | 1.34.23-1 | vulnerable |
sid, bookworm | 1.36.33+dfsg1-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
zoneminder | source | (unstable) | (unfixed) | unimportant |
https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea
src:zoneminder embedds bootstrap-table-export.js in debian/missing-sources/
https://github.com/wenzhixin/bootstrap-table/commit/66ef886d5d325777c8727274c9e018f9c17bc0b9 (1.20.2)
NOTE: Only supported for trusted users/behind auth, see README.debian.security