Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-xr9h-p2rc-rpqm: WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account

In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts.

Impact:

Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction.

Step to Reproduce:

  1. As normal USER go to Meet -> Schedule

https://demo.avideo.com/plugin/Meet/

  1. In “Meet topic” field put XSS payload

Example: "><img src=x onerror=alert(‘Pawned+by+Gonz’)>

  1. Then click Save

  2. Now as ADMIN go to Meet -> Schedule -> Upcoming

https://demo.avideo.com/plugin/Meet/

  1. Then the XSS payload that normal USER created will be executed

Video POC: https://youtu.be/Nke0Bmv5F-o

ghsa
#xss#vulnerability#git#perl
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-30860

WWBN/AVideo stored XSS vulnerability leads to takeover of any user’s account, including admin’s account

High severity GitHub Reviewed Published Apr 29, 2023 in WWBN/AVideo • Updated May 1, 2023

Package

In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts.

Impact:

Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction.

Step to Reproduce:

  1. As normal USER go to Meet -> Schedule

https://demo.avideo.com/plugin/Meet/

  1. In “Meet topic” field put XSS payload

Example: "><img src=x onerror=alert(‘Pawned+by+Gonz’)>

  1. Then click Save

  2. Now as ADMIN go to Meet -> Schedule -> Upcoming

https://demo.avideo.com/plugin/Meet/

  1. Then the XSS payload that normal USER created will be executed

Video POC: https://youtu.be/Nke0Bmv5F-o

References

  • GHSA-xr9h-p2rc-rpqm

Published to the GitHub Advisory Database

May 1, 2023

Related news

CVE-2023-30860: Stored XSS leads to any User's Account Takeover including Admin's Account

WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.