CVE-2023-30860

WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:00

Type Values Removed Values Added
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm - Exploit, Vendor Advisory () https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm - Exploit, Vendor Advisory
References () https://youtu.be/Nke0Bmv5F-o - Exploit, Third Party Advisory () https://youtu.be/Nke0Bmv5F-o - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 8.0

Information

Published : 2023-05-08 19:15

Updated : 2024-11-21 08:00


NVD link : CVE-2023-30860

Mitre link : CVE-2023-30860

CVE.ORG link : CVE-2023-30860


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')