Skip to main content

CVE-2023-46480: n/a in n/a

Critical
VulnerabilityCVE-2023-46480cvecve-2023-46480
Published: Mon Nov 27 2023 (11/27/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via the authHost parameter of the indieauth function.

AI-Powered Analysis

AILast updated: 07/07/2025, 16:10:20 UTC

Technical Analysis

CVE-2023-46480 is a critical remote code execution (RCE) vulnerability affecting OwnCast version 0.1.1. OwnCast is an open-source, self-hosted live video and web chat server. The vulnerability arises from improper handling of the 'authHost' parameter within the indieauth function, which is responsible for authentication. An attacker can exploit this flaw by sending a specially crafted request with a malicious 'authHost' parameter, leading to arbitrary code execution on the server. This allows the attacker to execute commands remotely without any authentication or user interaction. Additionally, the vulnerability enables the attacker to access sensitive information stored or processed by the server. The underlying weakness corresponds to CWE-94, which is related to improper control of code generation, often leading to code injection or execution issues. The CVSS v3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of exploitation (network vector, no privileges required, no user interaction) and its severe impact on confidentiality, integrity, and availability. No patches or mitigations have been officially published at the time of disclosure, and there are no known exploits in the wild yet. However, given the critical nature, it is highly likely that threat actors will attempt to weaponize this vulnerability rapidly. Organizations using OwnCast 0.1.1 or similar versions should consider this a high-priority security risk.

Potential Impact

For European organizations, the impact of CVE-2023-46480 can be severe, especially for those relying on OwnCast for live streaming or internal communication platforms. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, steal sensitive data, disrupt services, or use the compromised server as a pivot point for further attacks within the network. This can result in data breaches, loss of service availability, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. Given the criticality and ease of exploitation, organizations with public-facing OwnCast instances are particularly at risk. The vulnerability could also be leveraged for espionage or sabotage in sectors such as media, education, or government entities that use OwnCast for broadcasting or communication. The absence of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts.

Mitigation Recommendations

Immediate mitigation steps include: 1) Disabling or restricting access to the indieauth function or the 'authHost' parameter if possible, until a patch is available. 2) Implementing network-level protections such as Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'authHost' parameter. 3) Restricting OwnCast server access to trusted IP addresses or VPNs to reduce exposure. 4) Monitoring server logs for unusual or malformed requests related to authentication functions. 5) Applying strict input validation and sanitization on parameters if custom modifications are possible. 6) Keeping OwnCast installations isolated from critical infrastructure to limit lateral movement in case of compromise. 7) Regularly backing up OwnCast configurations and data to enable recovery. Organizations should closely monitor OwnCast project updates and apply official patches as soon as they are released. Additionally, conducting penetration testing and vulnerability scanning focused on OwnCast deployments can help identify exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-10-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6841d069182aa0cae2e88646

Added to database: 6/5/2025, 5:14:17 PM

Last enriched: 7/7/2025, 4:10:20 PM

Last updated: 7/31/2025, 1:22:54 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats