CVE-2016-20036

| EUVD-2016-10827 MEDIUM
2026-03-15 VulnCheck
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
EUVD ID Assigned
Mar 15, 2026 - 20:00 euvd
EUVD-2016-10827
Analysis Generated
Mar 15, 2026 - 20:00 vuln.today
CVE Published
Mar 15, 2026 - 18:34 nvd
MEDIUM 6.1

Description

Wowza Streaming Engine 4.5.0 contains multiple reflected cross-site scripting vulnerabilities in the enginemanager interface where input passed through various parameters is not properly sanitized before being returned to users. Attackers can inject malicious script code through parameters like appName, vhost, uiAppType, and wowzaCloudDestinationType in multiple endpoints to execute arbitrary HTML and JavaScript in a user's browser session.

Analysis

Wowza Streaming Engine 4.5.0 contains multiple reflected cross-site scripting (XSS) vulnerabilities in the enginemanager interface where user-supplied input through parameters (appName, vhost, uiAppType, wowzaCloudDestinationType) is not properly sanitized before being returned to users. An attacker can inject malicious JavaScript to execute arbitrary code in a victim's browser session, potentially compromising administrator credentials or session tokens. A public proof-of-concept exploit exists, increasing real-world exploitation risk.

Technical Context

The vulnerability stems from CWE-79 (Improper Neutralization of Input During Web Page Generation), a classic reflected XSS flaw where the enginemanager web interface fails to properly encode or validate user input before reflecting it in HTTP responses. The affected product is specifically Wowza Streaming Engine (CPE: cpe:2.3:a:wowza_media_systems,_llc.:wowza_streaming_engine:*:*:*:*:*:*:*:*), a commercial multimedia streaming platform. The vulnerability affects version 4.5.0 at minimum. The enginemanager is a web-based administrative interface that processes multiple query/POST parameters without adequate output encoding, allowing attackers to inject payloads that execute in the context of authenticated admin sessions.

Affected Products

Wowza Streaming Engine version 4.5.0 (confirmed in EUVD-2016-10827). The CPE mask cpe:2.3:a:wowza_media_systems,_llc.:wowza_streaming_engine:*:*:*:*:*:*:*:* suggests potential impact on other versions, but EUVD documentation confirms 4.5.0 as the reported affected version. The enginemanager interface is the attack surface. Vendor: Wowza Media Systems, LLC. No vendor advisory link was provided in the reference set, though ZeroScience (http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5343.php) and VulnCheck (https://www.vulncheck.com/advisories/wowza-streaming-engine-multiple-cross-site-scripting-vulnerabilities) published advisories.

Remediation

Specific patch version not explicitly stated in provided data. Recommended remediation steps: (1) Upgrade Wowza Streaming Engine to a version released after 4.5.0 that addresses XSS sanitization (consult Wowza release notes); (2) Implement Web Application Firewall (WAF) rules to block payloads containing script tags or event handlers in parameters (appName, vhost, uiAppType, wowzaCloudDestinationType); (3) Apply HTTP-only and Secure flags to session cookies to mitigate session hijacking via XSS; (4) Implement Content Security Policy (CSP) headers to restrict inline script execution; (5) Restrict administrative interface access via IP allowlisting or VPN; (6) Update input validation and output encoding in enginemanager endpoints to use context-aware encoding libraries. Consult Wowza Media Systems official patch documentation or contact vendor support for specific upgrade paths.

Priority Score

51
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +30
POC: +20

Share

CVE-2016-20036 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy