Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability that allows attackers to inject arbitrary client-side scripts through the content material URL parameter. Attackers can exploit this vulnerability to hijack user sessions, execute cross-site scripting code, and modify display content by manipulating the input material type.
References
| Link | Resource |
|---|---|
| https://cxsecurity.com/issue/WLB-2020120030 | Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/192605 | Third Party Advisory |
| https://packetstorm.news/files/id/160345 | Exploit Third Party Advisory |
| https://pro-bravia.sony.net | Product |
| https://pro-bravia.sony.net/resources/software/bravia-signage/ | Product |
| https://pro.sony/ue_US/products/display-software | Product |
| https://www.exploit-db.com/exploits/49186 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/sony-bravia-digital-signage-unauthenticated-remote-file-inclusion | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5612.php | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-06 16:15
Updated : 2026-01-26 16:15
NVD link : CVE-2020-36924
Mitre link : CVE-2020-36924
CVE.ORG link : CVE-2020-36924
JSON object : View
Products Affected
sony
- bravia_signage
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
