AzuraCast/AzuraCast vulnerable to cross-site scripting
Low severity
GitHub Reviewed
Published
Apr 20, 2023
to the GitHub Advisory Database
•
Updated Nov 7, 2023
Description
Published by the National Vulnerability Database
Apr 20, 2023
Published to the GitHub Advisory Database
Apr 20, 2023
Reviewed
Apr 20, 2023
Last updated
Nov 7, 2023
AzuraCast/AzuraCast prior to version 0.18.0 is vulnerable to stored cross-site scripting. An issue was identified where a user who already had an AzuraCast account could update their display name to inject malicious JavaScript into the header menu of the site. In a majority of cases, this menu is only visible to the current logged-in user (pages like the
Administer Users
page are unaffected by this vulnerability), but if a higher-privileged administrator uses theLog In As
feature to masquerade as a user, then the JavaScript injection could exfiltrate certain data. Anonymous members of the public cannot exploit this vulnerability in an AzuraCast installation, so it is primarily of concern for multi-tenant installations (i.e. resellers).References