CVE-2024-29193

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29193
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-29193.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-29193
Aliases
Published
2024-04-04T19:15:08Z
Modified
2025-09-03T04:51:27.721568Z
Summary
[none]
Details

gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (index.html) shows the available streams by fetching the API in the client side. Then, it uses Object.entries to iterate over the result whose first item (name) gets appended using innerHTML. In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtc’s origin. As of time of publication, no patch is available.

References

Affected packages

Git / github.com/alexxit/go2rtc

Affected ranges

Type
GIT
Repo
https://github.com/alexxit/go2rtc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.1-alpha.1
v0.1-alpha.10
v0.1-alpha.11
v0.1-alpha.2
v0.1-alpha.3
v0.1-alpha.4
v0.1-alpha.5
v0.1-alpha.6
v0.1-alpha.7
v0.1-alpha.8
v0.1-alpha.9
v0.1-beta.1
v0.1-beta.10
v0.1-beta.2
v0.1-beta.3
v0.1-beta.4
v0.1-beta.5
v0.1-beta.6
v0.1-beta.7
v0.1-beta.8
v0.1-beta.9
v0.1-rc.1
v0.1-rc.2
v0.1-rc.3
v0.1-rc.4
v0.1-rc.5
v0.1-rc.6
v0.1-rc.7
v0.1-rc.8
v0.1-rc.9

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.5.0
v1.6.0
v1.6.1
v1.6.2
v1.7.0
v1.7.1
v1.8.0
v1.8.1
v1.8.2
v1.8.3
v1.8.4
v1.8.5