Vulnerabilities
Vulnerable Software
Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. The Owncast application exposes an administrator API at the URL /api/admin. The emoji/delete endpoint of said API allows administrators to delete custom emojis, which are saved on disk. The parameter name is taken from the JSON request and directly appended to the filepath that points to the emoji to delete. By using path traversal sequences (../), attackers with administrative privileges can exploit this endpoint to delete arbitrary files on the system, outside of the emoji directory. This vulnerability is fixed in 0.1.3.
CVSS Score
2.7
EPSS Score
0.001
Published
2024-04-19
Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. In versions 0.1.2 and prior, a lenient CORS policy allows attackers to make a cross origin request, reading privileged information. This can be used to leak the admin password. Commit 9215d9ba0f29d62201d3feea9e77dcd274581624 fixes this issue.
CVSS Score
8.2
EPSS Score
0.001
Published
2024-03-20
Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0.
CVSS Score
8.3
EPSS Score
0.487
Published
2023-06-10
SQL Injection in GitHub repository owncast/owncast prior to 0.0.13.
CVSS Score
8.8
EPSS Score
0.002
Published
2022-11-29
Owncast is an open source, self-hosted live video streaming and chat server. In affected versions inline scripts are executed when Javascript is parsed via a paste action. This issue is patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.
CVSS Score
8.2
EPSS Score
0.003
Published
2021-12-14


Contact Us

Shodan ® - All rights reserved