CVE-2023-49715: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo
A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-49715 identifies an unrestricted file upload vulnerability in the WWBN AVideo platform, specifically in the import.json.php temporary copy functionality present in the dev master commit 15fed957fb. The vulnerability is classified under CWE-434, which involves the unrestricted upload of files with dangerous types. An attacker can craft HTTP requests to upload arbitrary PHP files without proper validation or restriction. While the upload alone does not guarantee code execution, when chained with a local file inclusion (LFI) vulnerability, it enables an attacker to execute arbitrary code on the server, potentially compromising the integrity of the system. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity level, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. No public patches or exploits are currently known, but the vulnerability poses a risk to installations running the affected development version. The attack vector involves sending a series of HTTP requests to the vulnerable endpoint to upload malicious PHP files, which can then be included and executed via LFI. This type of vulnerability is critical in web applications that handle file uploads without strict validation, especially in open-source projects where development branches may be deployed in production environments without adequate security controls.
Potential Impact
For European organizations using WWBN AVideo, particularly the affected dev master commit version, this vulnerability could lead to unauthorized code execution on their servers if combined with an LFI vulnerability. This compromises the integrity of their systems, potentially allowing attackers to modify content, inject malicious scripts, or pivot within the network. While confidentiality and availability are not directly impacted, the integrity breach can lead to further exploitation, data manipulation, or service disruption. Organizations in media, education, or content delivery sectors that rely on AVideo for streaming or video management are at higher risk. Exploitation could damage reputation, lead to regulatory non-compliance (e.g., GDPR if personal data is affected), and incur remediation costs. The medium severity score suggests moderate urgency but should not be ignored, especially given the potential for chaining with other vulnerabilities to escalate impact.
Mitigation Recommendations
1. Immediately restrict file upload types on the import.json.php endpoint to disallow PHP or any executable file formats. 2. Implement strict server-side validation and sanitization of uploaded files, including MIME type checks and file extension whitelisting. 3. Apply input validation to prevent local file inclusion vulnerabilities that could be chained with this upload flaw. 4. Avoid deploying development or master branch commits in production environments; use stable, security-patched releases only. 5. Monitor web server logs for suspicious upload attempts or unusual HTTP request patterns targeting import.json.php. 6. Employ web application firewalls (WAF) with custom rules to detect and block malicious upload attempts. 7. Conduct regular code audits focusing on file upload and inclusion functionalities. 8. If possible, isolate the AVideo application environment to limit the impact of potential code execution. 9. Stay updated with vendor advisories for patches or security updates addressing this vulnerability. 10. Educate developers and administrators about secure file handling practices and the risks of deploying unvetted code.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2023-49715: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo
Description
A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-49715 identifies an unrestricted file upload vulnerability in the WWBN AVideo platform, specifically in the import.json.php temporary copy functionality present in the dev master commit 15fed957fb. The vulnerability is classified under CWE-434, which involves the unrestricted upload of files with dangerous types. An attacker can craft HTTP requests to upload arbitrary PHP files without proper validation or restriction. While the upload alone does not guarantee code execution, when chained with a local file inclusion (LFI) vulnerability, it enables an attacker to execute arbitrary code on the server, potentially compromising the integrity of the system. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity level, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. No public patches or exploits are currently known, but the vulnerability poses a risk to installations running the affected development version. The attack vector involves sending a series of HTTP requests to the vulnerable endpoint to upload malicious PHP files, which can then be included and executed via LFI. This type of vulnerability is critical in web applications that handle file uploads without strict validation, especially in open-source projects where development branches may be deployed in production environments without adequate security controls.
Potential Impact
For European organizations using WWBN AVideo, particularly the affected dev master commit version, this vulnerability could lead to unauthorized code execution on their servers if combined with an LFI vulnerability. This compromises the integrity of their systems, potentially allowing attackers to modify content, inject malicious scripts, or pivot within the network. While confidentiality and availability are not directly impacted, the integrity breach can lead to further exploitation, data manipulation, or service disruption. Organizations in media, education, or content delivery sectors that rely on AVideo for streaming or video management are at higher risk. Exploitation could damage reputation, lead to regulatory non-compliance (e.g., GDPR if personal data is affected), and incur remediation costs. The medium severity score suggests moderate urgency but should not be ignored, especially given the potential for chaining with other vulnerabilities to escalate impact.
Mitigation Recommendations
1. Immediately restrict file upload types on the import.json.php endpoint to disallow PHP or any executable file formats. 2. Implement strict server-side validation and sanitization of uploaded files, including MIME type checks and file extension whitelisting. 3. Apply input validation to prevent local file inclusion vulnerabilities that could be chained with this upload flaw. 4. Avoid deploying development or master branch commits in production environments; use stable, security-patched releases only. 5. Monitor web server logs for suspicious upload attempts or unusual HTTP request patterns targeting import.json.php. 6. Employ web application firewalls (WAF) with custom rules to detect and block malicious upload attempts. 7. Conduct regular code audits focusing on file upload and inclusion functionalities. 8. If possible, isolate the AVideo application environment to limit the impact of potential code execution. 9. Stay updated with vendor advisories for patches or security updates addressing this vulnerability. 10. Educate developers and administrators about secure file handling practices and the risks of deploying unvetted code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T22:24:43.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6ed4
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 11/4/2025, 7:08:41 PM
Last updated: 12/4/2025, 3:24:54 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Nation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.