Multiple vulnerabilities in the Flash component of VideoJS player versions prior to 4.0 could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks or cause a denial of service (DoS) condition.
The vulnerabilities are due to insufficient validation and sanitization of user-supplied input processed by the affected software. An unauthenticated, remote attacker could exploit these vulnerabilities by convincing a targeted user to open a malicious link that contains crafted content. When processed, the crafted content could allow the attacker to conduct cross-site scripting attacks or cause a DoS condition. An attacker could obtain browser-based sensitive information, such as authentication cookies or recently submitted data.
Proof-of-concept code that demonstrates an exploit of these vulnerabilities is publicly available.
Users are advised not to open media files from suspicious or unrecognized sources. If users cannot verify that media files are safe, they are advised not to open them.
For additional information about cross-site scripting attacks and the methods used to exploit these vulnerabilities, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Scripting (XSS) Threat Vectors.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit these vulnerabilities.
VideoJS has released a security advisory at the following link: Vulnerabilities in VideoJS
VideoJS has released updated software at the following link: VideoJS 4.2.2