A cross-site scripting (XSS) vulnerability in MiroTalk P2P before commit f535b35 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the settings module.
References
Link | Resource |
---|---|
https://github.com/miroslavpejic85/mirotalk | Product |
https://github.com/miroslavpejic85/mirotalk/commit/f535b3515d2d480dc3135b37982f5df93e43c592 | Patch |
https://github.com/miroslavpejic85/mirotalk/issues/139 | Exploit Issue Tracking Patch Vendor Advisory |
https://github.com/miroslavpejic85/mirotalk | Product |
https://github.com/miroslavpejic85/mirotalk/commit/f535b3515d2d480dc3135b37982f5df93e43c592 | Patch |
https://github.com/miroslavpejic85/mirotalk/issues/139 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-03-22 22:15
Updated : 2025-02-26 16:15
NVD link : CVE-2023-27054
Mitre link : CVE-2023-27054
CVE.ORG link : CVE-2023-27054
JSON object : View
Products Affected
mirotalk
- mirotalk_p2p
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')