Headline
GHSA-xr9h-p2rc-rpqm: WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account
In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts.
Impact:
Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction.
Step to Reproduce:
- As normal USER go to Meet -> Schedule
https://demo.avideo.com/plugin/Meet/
- In “Meet topic” field put XSS payload
Example: "><img src=x onerror=alert(‘Pawned+by+Gonz’)>
Then click Save
Now as ADMIN go to Meet -> Schedule -> Upcoming
https://demo.avideo.com/plugin/Meet/
- Then the XSS payload that normal USER created will be executed
Video POC: https://youtu.be/Nke0Bmv5F-o
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-30860
WWBN/AVideo stored XSS vulnerability leads to takeover of any user’s account, including admin’s account
High severity GitHub Reviewed Published Apr 29, 2023 in WWBN/AVideo • Updated May 1, 2023
Package
In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts.
Impact:
Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction.
Step to Reproduce:
- As normal USER go to Meet -> Schedule
https://demo.avideo.com/plugin/Meet/
- In “Meet topic” field put XSS payload
Example: "><img src=x onerror=alert(‘Pawned+by+Gonz’)>
Then click Save
Now as ADMIN go to Meet -> Schedule -> Upcoming
https://demo.avideo.com/plugin/Meet/
- Then the XSS payload that normal USER created will be executed
Video POC: https://youtu.be/Nke0Bmv5F-o
References
- GHSA-xr9h-p2rc-rpqm
Published to the GitHub Advisory Database
May 1, 2023
Related news
WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.