CVE-2024-29191

gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (`links.html`) appends the `src` GET parameter (`[0]`) in all of its links for 1-click previews. The context in which `src` is being appended is `innerHTML` (`[1]`), which will insert the text as HTML. Commit 3b3d5b033aac3a019af64f83dec84f70ed2c8aba contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:alexxit:go2rtc:*:*:*:*:*:*:*:*

History

02 Sep 2025, 15:24

Type Values Removed Values Added
CPE cpe:2.3:a:alexxit:go2rtc:*:*:*:*:*:*:*:*
References () https://github.com/AlexxIT/go2rtc/commit/3b3d5b033aac3a019af64f83dec84f70ed2c8aba - () https://github.com/AlexxIT/go2rtc/commit/3b3d5b033aac3a019af64f83dec84f70ed2c8aba - Patch
References () https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ - () https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ - Exploit, Third Party Advisory
First Time Alexxit go2rtc
Alexxit

Information

Published : 2024-04-04 15:15

Updated : 2025-09-02 15:24


NVD link : CVE-2024-29191

Mitre link : CVE-2024-29191

CVE.ORG link : CVE-2024-29191


JSON object : View

Products Affected

alexxit

  • go2rtc
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')