Описание
WWBN AVideo command injection vulnerability
WWBN AVideo Authenticated RCE
A command injection vulnerability exists at plugin/CloneSite/cloneClient.json.php which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854 which affects WWBN Avideo up to version 12.3
Vulnerable Code
/plugin/CloneSite/cloneClient.json.php
The $objClone->cloneSiteURL is not properly sanitized.
Exploit Proof-of-Concept
avidexploit.py
Run in command line
- Then get your public facing IP and Port. Enter a cloneSiteURL like the following then hit clone to achieve command injection
It is important to not use white spaces for the exploit to work. Replace whitespace with $IFS when adding arguments to your RCE

Credits
Пакеты
wwbn/avideo
<= 12.4
Отсутствует
Связанные уязвимости
WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.