CVE-2022-32771

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-32771
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32771.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-32771
Published
2022-08-22T19:15:10Z
Modified
2025-01-08T09:03:13.752066Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization.

References

Affected packages

Git / github.com/wwbn/avideo

Affected ranges

Type
GIT
Repo
https://github.com/wwbn/avideo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

10.*

10.4
10.8

Other

11

11.*

11.1
11.1.1
11.5
11.6

2.*

2.2
2.4
2.7

3.*

3.4
3.4.1

4.*

4.0
4.0.1
4.0.2

5.*

5.0

6.*

6.5

7.*

7.2
7.3
7.4
7.5
7.6
7.7
7.8

8.*

8.1
8.5
8.6
8.7
8.9
8.9.1