Remote code injection in wwbn/avideo
Description
Published to the GitHub Advisory Database
Apr 27, 2023
Reviewed
Apr 27, 2023
Published by the National Vulnerability Database
Apr 28, 2023
Last updated
Nov 4, 2023
WWBN Avideo Authenticated RCE - OS Command Injection
Description
An OS Command Injection vulnerability in an Authenticated endpoint
/plugin/CloneSite/cloneClient.json.php
allows attackers to achieve Remote Code Execution.Vulnerable code:
We can control
$objClone->cloneSiteURL
through the admin panel clone site feature./plugin/CloneSite/cloneClient.json.php
sends a GET Request to{$objClone->cloneSiteURL}/plugin/CloneSite/cloneServer.json.php
. I hosted a specially craftedcloneServer.json.php
that prints the following JSON dataSend a GET Request to
/plugin/CloneSite/cloneClient.json.php
then remote code execution is achieved.References