CVE-2022-32768

Source
https://cve.org/CVERecord?id=CVE-2022-32768
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32768.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-32768
Published
2022-08-22T19:15:10.347Z
Modified
2025-11-20T12:07:42.544604Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
[none]
Details

Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's streams.

References

Affected packages

Git / github.com/wwbn/avideo

Affected ranges

Type
GIT
Repo
https://github.com/wwbn/avideo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

10.*
10.4
10.8
Other
11
11.*
11.1
11.1.1
11.5
11.6
2.*
2.2
2.4
2.7
3.*
3.4
3.4.1
4.*
4.0
4.0.1
4.0.2
5.*
5.0
6.*
6.5
7.*
7.2
7.3
7.4
7.5
7.6
7.7
7.8
8.*
8.1
8.5
8.6
8.7
8.9
8.9.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32768.json"