CVE-2024-29882

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29882
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-29882.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-29882
Aliases
  • GHSA-gv9r-qcjc-5hj7
Published
2024-03-28T13:33:42.500Z
Modified
2025-11-30T18:48:42.303505Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
SRS DOM - XSS on JSONP callback
Details

SRS is a simple, high-efficiency, real-time video server. SRS's /api/v1/vhosts/vid-<id>?callback=<payload> endpoint didn't filter the callback function name which led to injecting malicious javascript payloads and executing XSS ( Cross-Site Scripting). This vulnerability is fixed in 5.0.210 and 6.0.121.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/29xxx/CVE-2024-29882.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/ossrs/srs

Affected ranges

Type
GIT
Repo
https://github.com/ossrs/srs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0

v1.*

v1.0-r0

v2.*

v2.0-a0
v2.0-a1
v2.0-a2
v2.0-a3
v2.0-b0
v2.0-b1
v2.0-b2
v2.0-b3
v2.0-b4
v2.0-r0
v2.0-r1
v2.0-r2
v2.0-r3
v2.0-r4
v2.0-r5
v2.0-r6
v2.0-r7
v2.0-r8

v3.*

v3.0-a0
v3.0-a1
v3.0-a2
v3.0-a3
v3.0-a4
v3.0-a5
v3.0-a6
v3.0-a7
v3.0-a8
v3.0-a9
v3.0-b0
v3.0-b1
v3.0-b2
v3.0-b3
v3.0-b4
v3.0-r0
v3.0-r1
v3.0-r2
v3.0-r3

v4.*

v4.0-b0
v4.0-b1
v4.0-b10
v4.0-b2
v4.0-b3
v4.0-b5
v4.0-b6
v4.0-b7
v4.0-b8
v4.0-b9
v4.0-r0
v4.0-r1
v4.0-r2
v4.0-r3
v4.0-r4

v5.*

v5.0-a0
v5.0-a1
v5.0-a2

v6.*

v6.0-d0
v6.0-d1
v6.0-d2
v6.0-d3
v6.0-d4
v6.0.10
v6.0.36
v6.0.45
v6.0.48

Database specific

vanir_signatures

[
    {
        "digest": {
            "line_hashes": [
                "51331076260704782388217210023354136357",
                "212296809016094972470653598659566661353",
                "27929993880543800799733862745352639025",
                "221180860166256488453906821182588866426",
                "153482185210129231678574555006858481119",
                "98343271453330675262125054440273668624",
                "306028441414888796757303718790337975647",
                "209091840125063562187424494637493943060",
                "317442199544706622938477496081021741511",
                "68442070361506501621736883367351764626",
                "95723457923698245765128480367895454891",
                "335262093353938068893257561734285562251"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2024-29882-094323cc",
        "target": {
            "file": "trunk/src/protocol/srs_protocol_http_conn.cpp"
        },
        "source": "https://github.com/ossrs/srs/commit/244ce7bc013a0b805274a65132a2980680ba6b9d"
    },
    {
        "digest": {
            "line_hashes": [
                "126123604150206928519426776614144614196",
                "169197213057109872522810241202788724393",
                "57766131618121208857558053770792752477",
                "59247926496317154915664063860174616185"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2024-29882-dc66ef25",
        "target": {
            "file": "trunk/src/kernel/srs_kernel_error.hpp"
        },
        "source": "https://github.com/ossrs/srs/commit/244ce7bc013a0b805274a65132a2980680ba6b9d"
    },
    {
        "digest": {
            "function_hash": "111536652742290614265247733577924431419",
            "length": 748.0
        },
        "deprecated": false,
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2024-29882-e2715aae",
        "target": {
            "file": "trunk/src/protocol/srs_protocol_http_conn.cpp",
            "function": "SrsHttpMessage::set_url"
        },
        "source": "https://github.com/ossrs/srs/commit/244ce7bc013a0b805274a65132a2980680ba6b9d"
    }
]