logo

CVE-2024-29193 github.com/alexxit/go2rtc

Package

Manager: go
Name: github.com/alexxit/go2rtc
Vulnerable Version: >=0 <1.9.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00169 pctl0.38496

Details

gotortc Cross-site Scripting vulnerability gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (`index.html`) shows the available streams by fetching the API in the client side. Then, it uses `Object.entries` to iterate over the result whose first item (`name`) gets appended using `innerHTML`. In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtc’s origin.

Metadata

Created: 2024-08-05T21:29:25Z
Modified: 2024-08-05T21:29:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-rh4r-f7f7-r99m/GHSA-rh4r-f7f7-r99m.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-rh4r-f7f7-r99m
Finding: F008
Auto approve: 1