Description
An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql
Third Party Advisory x_refsource_misc
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542
Scores
CVSS v3
7.5
EPSS
0.0112
EPSS Percentile
78.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-732
Status
published
Products (1)
wwbn/avideo
11.6
Published
Aug 22, 2022
Tracked Since
Feb 18, 2026