A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The name of the patch is 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.217427 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.217427 | Permissions Required Third Party Advisory |
https://github.com/kaltura/mwEmbed/releases/tag/v2.96.rc2 | Release Notes Third Party Advisory |
https://github.com/kaltura/mwEmbed/pull/4266 | Patch Third Party Advisory |
https://github.com/kaltura/mwEmbed/commit/13b8812ebc8c9fa034eed91ab35ba8423a528c0b | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-01-04 15:15
Updated : 2023-01-30 08:37
NVD link : CVE-2022-4876
Mitre link : CVE-2022-4876
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
kaltura
- mwembed