CVE-2022-32777

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-32777
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32777.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-32777
Published
2022-08-22T19:15:10Z
Modified
2025-01-08T09:03:04.442744Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript.

References

Affected packages

Git / github.com/wwbn/avideo

Affected ranges

Type
GIT
Repo
https://github.com/wwbn/avideo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

10.*

10.4
10.8

Other

11

11.*

11.1
11.1.1
11.5
11.6

2.*

2.2
2.4
2.7

3.*

3.4
3.4.1

4.*

4.0
4.0.1
4.0.2

5.*

5.0

6.*

6.5

7.*

7.2
7.3
7.4
7.5
7.6
7.7
7.8

8.*

8.1
8.5
8.6
8.7
8.9
8.9.1