cve/2024/CVE-2024-29193.md
2024-08-05 18:41:32 +00:00

18 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-29193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29193)
![](https://img.shields.io/static/v1?label=Product&message=go2rtc&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.8.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (`index.html`) shows the available streams by fetching the API in the client side. Then, it uses `Object.entries` to iterate over the result whose first item (`name`) gets appended using `innerHTML`. In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtcs origin. As of time of publication, no patch is available.
### POC
#### Reference
- https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
#### Github
No PoCs found on GitHub currently.