logo

CVE-2023-30860 wwbn/avideo

Package

Manager: composer
Name: wwbn/avideo
Vulnerable Version: >=0 <12.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.0325 pctl0.8672

Details

WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts. Impact: Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction. Step to Reproduce: 1. As normal USER go to Meet -> Schedule https://demo.avideo.com/plugin/Meet/ 2. In "Meet topic" field put XSS payload Example: "><img src=x onerror=alert('Pawned+by+Gonz')> 3. Then click Save 4. Now as ADMIN go to Meet -> Schedule -> Upcoming https://demo.avideo.com/plugin/Meet/ 5. Then the XSS payload that normal USER created will be executed Video POC: https://youtu.be/Nke0Bmv5F-o

Metadata

Created: 2023-05-01T22:30:28Z
Modified: 2023-05-01T22:30:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-xr9h-p2rc-rpqm/GHSA-xr9h-p2rc-rpqm.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-xr9h-p2rc-rpqm
Finding: F425
Auto approve: 1