Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-46998 PoC — BootBox Bootbox.js 安全漏洞

Source
Associated Vulnerability
Title:BootBox Bootbox.js 安全漏洞 (CVE-2023-46998)
Description:BootBox Bootbox.js是BootBox公司的一个用于 Bootstrap 框架的警报、确认和提示对话框。 BootBox Bootbox.js v.3.2版本至v.6.0版本存在安全漏洞,该漏洞源于存在跨站脚本漏洞,允许远程攻击者通过精心设计的有效载荷执行任意代码。
Readme
# Cross Site Scripting in Bootbox.js v.3.2 thru 6.0 allows a remote attacker to to inject HTML code and execute arbitrary JavaScript.

## Summary
Vendor: BootBox

Product: bootbox.js

Affected version(s): 3.2 to 6.0

CodeName: Venga-Que-Si-Es-Pa-Eso

## Vulnerability
Type: Improper Neutralization of Input During Web Page Generation 'Cross-site Scripting' (CWE-79)

CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSSv3.1 Base Score: 5.4 (Medium)

Exploit Available: Yes

CVE ID: CVE-2023-46998

## Description
Functions like alert(), confirm(), prompt() does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript via use Jquery

## Poc
### Steps to reproduce
Insert `<script>alert('Hola BB :*')</script>` into a vulnerable function like prompt. Vulnerable code available here: https://jsfiddle.net/93sk1zeh/2/

## Exploit
`<script>alert('Hola BB :*')</script>`

## Mitigation
Sanitize input before adding it to a DOM element using jquery

## References
https://github.com/bootboxjs/bootbox/issues/661

## Timeline
2018-05-28: Vulnerability reported to vendor.

2023-10-01: CVE ID assigned
File Snapshot

[4.0K] /data/pocs/123713d865f3cb3641b8492412f90b0c2ed344e7 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.