This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
References
| Link | Resource |
|---|---|
| https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588 | Exploit Third Party Advisory |
| https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2 | Patch Third Party Advisory |
| https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429 | Exploit Third Party Advisory |
| https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587 | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-07-28 08:15
Updated : 2021-08-04 15:13
NVD link : CVE-2021-23414
Mitre link : CVE-2021-23414
JSON object : View
Products Affected
videojs
- video.js
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
