CVE-2024-29191

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29191
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-29191.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-29191
Aliases
Withdrawn
2024-10-02T01:19:24.028457Z
Published
2024-04-04T15:15:39Z
Modified
2024-08-06T23:12:03.815141Z
Summary
[none]
Details

gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (links.html) appends the src GET parameter ([0]) in all of its links for 1-click previews. The context in which src is being appended is innerHTML ([1]), which will insert the text as HTML. Commit 3b3d5b033aac3a019af64f83dec84f70ed2c8aba contains a patch for the issue.

References

Affected packages

Git / github.com/alexxit/go2rtc

Affected ranges

Type
GIT
Repo
https://github.com/alexxit/go2rtc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1-alpha.1
v0.1-alpha.10
v0.1-alpha.11
v0.1-alpha.2
v0.1-alpha.3
v0.1-alpha.4
v0.1-alpha.5
v0.1-alpha.6
v0.1-alpha.7
v0.1-alpha.8
v0.1-alpha.9
v0.1-beta.1
v0.1-beta.10
v0.1-beta.2
v0.1-beta.3
v0.1-beta.4
v0.1-beta.5
v0.1-beta.6
v0.1-beta.7
v0.1-beta.8
v0.1-beta.9
v0.1-rc.1
v0.1-rc.2
v0.1-rc.3
v0.1-rc.4
v0.1-rc.5
v0.1-rc.6
v0.1-rc.7
v0.1-rc.8
v0.1-rc.9

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.5.0
v1.6.0
v1.6.1
v1.6.2
v1.7.0
v1.7.1
v1.8.0
v1.8.1
v1.8.2
v1.8.3
v1.8.4
v1.8.5