First published: Mon Aug 22 2022(Updated: )
A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WWBN AVideo | =11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32771 is classified as a high severity cross-site scripting (XSS) vulnerability.
To fix CVE-2022-32771, upgrade to a non-vulnerable version of WWBN AVideo, such as 12.0 or later.
CVE-2022-32771 affects WWBN AVideo version 11.6 and earlier.
CVE-2022-32771 allows an attacker to execute arbitrary JavaScript on behalf of an authenticated user.
An attacker can exploit CVE-2022-32771 by crafting a malicious HTTP request that targets the footer alerts functionality.