CVE-2019-16763

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-16763
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16763.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-16763
Aliases
Related
Published
2019-11-22T19:15:12Z
Modified
2025-01-15T01:39:05.018367Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if pannellum.htm was hosted on a domain that shared cookies with the targeted site's user authentication; an <iframe> could then be embedded on the attacker's site using pannellum.htm from the targeted site, which would allow the attacker to potentially access information from the targeted site as the authenticated user (or worse if the targeted site did not have adequate CSRF protections) if the user clicked on a hot spot in the attacker's embedded panorama viewer. This was patched in version 2.5.5.

References

Affected packages

Git / github.com/mpetroff/pannellum

Affected ranges

Type
GIT
Repo
https://github.com/mpetroff/pannellum
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.1

1.*

1.0
1.2

2.*

2.0
2.0.1
2.1.0
2.1.1
2.2.0
2.2.1
2.3.0
2.3.1
2.3.2
2.4.0
2.4.1
2.5.0
2.5.1
2.5.2
2.5.3
2.5.4