Описание
Remote code injection in wwbn/avideo
WWBN Avideo Authenticated RCE - OS Command Injection
Description
An OS Command Injection vulnerability in an Authenticated endpoint /plugin/CloneSite/cloneClient.json.php allows attackers to achieve Remote Code Execution.
Vulnerable code:
We can control $objClone->cloneSiteURL through the admin panel clone site feature.
/plugin/CloneSite/cloneClient.json.php sends a GET Request to {$objClone->cloneSiteURL}/plugin/CloneSite/cloneServer.json.php. I hosted a specially crafted cloneServer.json.php that prints the following JSON data
Send a GET Request to /plugin/CloneSite/cloneClient.json.php then remote code execution is achieved.

Пакеты
wwbn/avideo
< 12.4
12.4
Связанные уязвимости
AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4.