First published: Mon Aug 22 2022(Updated: )
A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "msg" parameter which is inserted into the document with insufficient sanitization.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WWBN AVideo | =11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32772 is classified as a moderate severity cross-site scripting vulnerability.
To fix CVE-2022-32772, update WWBN AVideo to version 11.7 or later where the vulnerability is addressed.
Attackers can exploit CVE-2022-32772 to execute arbitrary JavaScript in the context of an authenticated user.
CVE-2022-32772 affects WWBN AVideo versions 11.6 and earlier.
Yes, an attacker needs to trick an authenticated user into sending a crafted HTTP request to exploit CVE-2022-32772.