CVE-2021-39183
Unsafe inline XSS Owncast
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Owncast is an open source, self-hosted live video streaming and chat server. In affected versions inline scripts are executed when Javascript is parsed via a paste action. This issue is patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.
Owncast es un servidor de chat y transmisión de vídeo en directo de código abierto y autoalojado. En las versiones afectadas son ejecutados scripts en línea cuando es analizado Javascript mediante una acción de pegado. Este problema está parcheado en la versión 0.0.9 al bloquear la política de seguridad de contenidos unsafe-inline y la especificación del script-src. Es requerido que el worker-src sea establecido como blob para el reproductor de vídeo
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-16 CVE Reserved
- 2021-12-14 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-08-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Owncast Project Search vendor "Owncast Project" | Owncast Search vendor "Owncast Project" for product "Owncast" | < 0.0.9 Search vendor "Owncast Project" for product "Owncast" and version " < 0.0.9" | - |
Affected
|