Description
WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1451 | WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3. |
Github GHSA |
GHSA-2mhh-27v7-3vcx | WWBN AVideo command injection vulnerability |
References
History
Thu, 23 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-23T20:59:41.432Z
Reserved: 2023-05-01T16:47:35.315Z
Link: CVE-2023-32073
Updated: 2024-08-02T15:03:29.033Z
Status : Modified
Published: 2023-05-12T14:15:10.083
Modified: 2024-11-21T08:02:39.513
Link: CVE-2023-32073
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA