gotortc Cross-site Scripting vulnerability
Moderate severity
GitHub Reviewed
Published
Aug 5, 2024
to the GitHub Advisory Database
•
Updated Aug 5, 2024
Description
Published by the National Vulnerability Database
Apr 4, 2024
Published to the GitHub Advisory Database
Aug 5, 2024
Reviewed
Aug 5, 2024
Last updated
Aug 5, 2024
gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The index page (
index.html
) shows the available streams by fetching the API in the client side. Then, it usesObject.entries
to iterate over the result whose first item (name
) gets appended usinginnerHTML
. In the event of a victim visiting the server in question, their browser will execute the request against the go2rtc instance. After the request, the browser will be redirected to go2rtc, in which the XSS would be executed in the context of go2rtc’s origin.References