CVE-2021-39183

Owncast is an open source, self-hosted live video streaming and chat server. In affected versions inline scripts are executed when Javascript is parsed via a paste action. This issue is patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.
References
Link Resource
https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:owncast_project:owncast:*:*:*:*:*:*:*:*

History

20 Dec 2021, 20:38

Type Values Removed Values Added
CPE cpe:2.3:a:owncast_project:owncast:*:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p - (CONFIRM) https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p - Exploit, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 8.2
v2 : 4.3
v3 : 6.1

14 Dec 2021, 20:32

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-14 20:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-39183

Mitre link : CVE-2021-39183

CVE.ORG link : CVE-2021-39183


JSON object : View

Products Affected

owncast_project

  • owncast
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')