Description
AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6vrj-ph27-qfp3 | Remote code injection in wwbn/avideo |
References
History
Thu, 30 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-30T17:05:59.057Z
Reserved: 2023-04-18T16:13:15.881Z
Link: CVE-2023-30854
Updated: 2024-08-02T14:37:15.513Z
Status : Modified
Published: 2023-04-28T16:15:10.200
Modified: 2024-11-21T08:00:58.720
Link: CVE-2023-30854
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA