CVE-2023-30860
- Reference to the description:
- Description:
- WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.
- Last updated date:
- 05/17/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 05/17/2023
- Reference url to background
https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 05/17/2023
- Reference url to background