WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1654 WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.
Github GHSA Github GHSA GHSA-xr9h-p2rc-rpqm WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 29 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-29T15:05:30.585Z

Reserved: 2023-04-18T16:13:15.882Z

Link: CVE-2023-30860

cve-icon Vulnrichment

Updated: 2024-08-02T14:37:15.475Z

cve-icon NVD

Status : Modified

Published: 2023-05-08T19:15:12.310

Modified: 2024-11-21T08:00:59.490

Link: CVE-2023-30860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.