Vulnerability Description
A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "toast" parameter which is inserted into the document with insufficient sanitization.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wwbn | Avideo | 11.6 |
Related Weaknesses (CWE)
References
- https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538Technical DescriptionThird Party Advisory
- https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538Technical DescriptionThird Party Advisory
FAQ
What is CVE-2022-32770?
CVE-2022-32770 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascri...
How severe is CVE-2022-32770?
CVE-2022-32770 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32770?
Check the references section above for vendor advisories and patch information. Affected products include: Wwbn Avideo.