This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588 | Exploit Third Party Advisory |
https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/ | Mailing List Third Party Advisory |
Information
Published : 2021-07-28 01:15
Updated : 2023-02-03 11:12
NVD link : CVE-2021-23414
Mitre link : CVE-2021-23414
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
videojs
- video.js
fedoraproject
- fedora