Multiple cross-site scripting (XSS) vulnerabilities in the HTTP Interface in VideoLAN VLC Media Player before 2.0.7 allow remote attackers to inject arbitrary web script or HTML via the (1) command parameter to requests/vlm_cmd.xml, (2) dir parameter to requests/browse.xml, or (3) URI in a request, which is returned in an error message through share/lua/intf/http.lua.
References
Link | Resource |
---|---|
https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-007.txt | Exploit Third Party Advisory |
http://www.videolan.org/developers/vlc-branch/NEWS | Release Notes |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00001.html | Third Party Advisory |
http://git.videolan.org/gitweb.cgi/vlc.git/?p=vlc.git;a=commitdiff;h=bf02b8dd211d5a52aa301a9a2ff4e73ed8195881 | Patch Third Party Advisory |
Information
Published : 2020-01-31 14:15
Updated : 2020-02-03 13:53
NVD link : CVE-2013-3565
Mitre link : CVE-2013-3565
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
opensuse
- opensuse
videolan
- vlc_media_player