gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (`links.html`) appends the `src` GET parameter (`[0]`) in all of its links for 1-click previews. The context in which `src` is being appended is `innerHTML` (`[1]`), which will insert the text as HTML. Commit 3b3d5b033aac3a019af64f83dec84f70ed2c8aba contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/AlexxIT/go2rtc/commit/3b3d5b033aac3a019af64f83dec84f70ed2c8aba | Patch |
https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ | Exploit Third Party Advisory |
https://github.com/AlexxIT/go2rtc/commit/3b3d5b033aac3a019af64f83dec84f70ed2c8aba | Patch |
https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ | Exploit Third Party Advisory |
Configurations
History
02 Sep 2025, 15:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:alexxit:go2rtc:*:*:*:*:*:*:*:* | |
References | () https://github.com/AlexxIT/go2rtc/commit/3b3d5b033aac3a019af64f83dec84f70ed2c8aba - Patch | |
References | () https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ - Exploit, Third Party Advisory | |
First Time |
Alexxit go2rtc
Alexxit |
Information
Published : 2024-04-04 15:15
Updated : 2025-09-02 15:24
NVD link : CVE-2024-29191
Mitre link : CVE-2024-29191
CVE.ORG link : CVE-2024-29191
JSON object : View
Products Affected
alexxit
- go2rtc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')