Описание
WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account
In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts.
Impact:
Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction.
Step to Reproduce:
- As normal USER go to Meet -> Schedule
https://demo.avideo.com/plugin/Meet/
- In "Meet topic" field put XSS payload
Example: "><img src=x onerror=alert('Pawned+by+Gonz')>
-
Then click Save
-
Now as ADMIN go to Meet -> Schedule -> Upcoming
https://demo.avideo.com/plugin/Meet/
- Then the XSS payload that normal USER created will be executed
Video POC: https://youtu.be/Nke0Bmv5F-o
Пакеты
wwbn/avideo
< 12.4
12.4
Связанные уязвимости
WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.