8.8
CVSSv3

CVE-2023-30854

Published: 28/04/2023 Updated: 09/05/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows malicious users to achieve Remote Code Execution. This issue is fixed in version 12.4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wwbn avideo

Github Repositories

WWBN AVideo Authenticated RCE

WWBN AVideo {currentVersion} Authenticated RCE A command injection vulnerability exists at plugin/CloneSite/cloneClientjsonphp which allows Remote Code Execution if you CloneSite Plugin This is a bypass to the fix for CVE-2023-30854 which affects WWBN Avideo up to version 123 Vulnerable Code /plugin/CloneSite/cloneClientjsonphp $json->sqlFile = escapeshellarg(preg

WWBN Avideo Authenticated RCE - OS Command Injection CVE-2023-30854 WWBN Avideo < 123 Authenticated RCE An OS Command Injection vulnerability in an Authenticated endpoint /plugin/CloneSite/cloneClientjsonphp allows attackers to achieve Remote Code Execution Vulnerable code: $cmd = "wget -O {$clonesDir}{$json->sqlFile} {$objClone->cloneSiteURL}video