The PHP file view/about.php is vulnerable to an XSS issue due to no sanitization of the user agent.
At line [53], the website gets the user-agent from the headers through $_SERVER[‘HTTP_USER_AGENT’] and echo it without any sanitization.
In PHP, echo a user generated statement, here the User-Agent Header, without any sanitization allows an attacker to inject malicious scripts into the output of a web page, which are then executed in the browser of anyone viewing that page.
CPE | Name | Operator | Version |
---|---|---|---|
wwbn/avideo | eq | 11.1.1 | |
wwbn/avideo | eq | 11.5 | |
wwbn/avideo | eq | 10.8 | |
wwbn/avideo | eq | 11.6 | |
wwbn/avideo | eq | 12.4 | |
wwbn/avideo | eq | 11 | |
wwbn/avideo | eq | 10.4 | |
wwbn/avideo | eq | 11.1 |