CVE-2024-29193

gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (`index.html`) shows the available streams by fetching the API in the client side. Then, it uses `Object.entries` to iterate over the result whose first item (`name`) gets appended using `innerHTML`. In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtc’s origin. As of time of publication, no patch is available.
Configurations

No configuration.

History

21 Nov 2024, 09:07

Type Values Removed Values Added
References () https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ - () https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ -

02 Aug 2024, 16:16

Type Values Removed Values Added
Summary
  • (es) gotortc es una aplicación de transmisión de cámara. Las versiones 1.8.5 y anteriores son vulnerables a Cross-Site Scripting basadas en DOM. La página de índice (`index.html`) muestra las transmisiones disponibles al obtener la API (`[0]`) en el lado del cliente. Luego, usa `Object.entries` para iterar sobre el resultado (`[1]`) cuyo primer elemento (`name`) se agrega usando `innerHTML` (`[2]`). En caso de que una víctima visite el servidor en cuestión, su navegador ejecutará la solicitud en la instancia de go2rtc. Después de la solicitud, el navegador será redirigido a go2rtc, en el que el XSS se ejecutará en el contexto del origen de go2rtc. Al momento de la publicación, no hay ningún parche disponible.
Summary (en) gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (`index.html`) shows the available streams by fetching the API (`[0]`) in the client side. Then, it uses `Object.entries` to iterate over the result (`[1]`) whose first item (`name`) gets appended using `innerHTML` (`[2]`). In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtc’s origin. As of time of publication, no patch is available. (en) gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (`index.html`) shows the available streams by fetching the API in the client side. Then, it uses `Object.entries` to iterate over the result whose first item (`name`) gets appended using `innerHTML`. In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtc’s origin. As of time of publication, no patch is available.

04 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 19:15

Updated : 2024-11-21 09:07


NVD link : CVE-2024-29193

Mitre link : CVE-2024-29193

CVE.ORG link : CVE-2024-29193


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')