Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49715: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo

0
Medium
VulnerabilityCVE-2023-49715cvecve-2023-49715cwe-434
Published: Wed Jan 10 2024 (01/10/2024, 15:48:10 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:08:41 UTC

Technical Analysis

CVE-2023-49715 identifies an unrestricted file upload vulnerability in the WWBN AVideo platform, specifically in the import.json.php temporary copy functionality present in the dev master commit 15fed957fb. The vulnerability is classified under CWE-434, which involves the unrestricted upload of files with dangerous types. An attacker can craft HTTP requests to upload arbitrary PHP files without proper validation or restriction. While the upload alone does not guarantee code execution, when chained with a local file inclusion (LFI) vulnerability, it enables an attacker to execute arbitrary code on the server, potentially compromising the integrity of the system. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity level, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. No public patches or exploits are currently known, but the vulnerability poses a risk to installations running the affected development version. The attack vector involves sending a series of HTTP requests to the vulnerable endpoint to upload malicious PHP files, which can then be included and executed via LFI. This type of vulnerability is critical in web applications that handle file uploads without strict validation, especially in open-source projects where development branches may be deployed in production environments without adequate security controls.

Potential Impact

For European organizations using WWBN AVideo, particularly the affected dev master commit version, this vulnerability could lead to unauthorized code execution on their servers if combined with an LFI vulnerability. This compromises the integrity of their systems, potentially allowing attackers to modify content, inject malicious scripts, or pivot within the network. While confidentiality and availability are not directly impacted, the integrity breach can lead to further exploitation, data manipulation, or service disruption. Organizations in media, education, or content delivery sectors that rely on AVideo for streaming or video management are at higher risk. Exploitation could damage reputation, lead to regulatory non-compliance (e.g., GDPR if personal data is affected), and incur remediation costs. The medium severity score suggests moderate urgency but should not be ignored, especially given the potential for chaining with other vulnerabilities to escalate impact.

Mitigation Recommendations

1. Immediately restrict file upload types on the import.json.php endpoint to disallow PHP or any executable file formats. 2. Implement strict server-side validation and sanitization of uploaded files, including MIME type checks and file extension whitelisting. 3. Apply input validation to prevent local file inclusion vulnerabilities that could be chained with this upload flaw. 4. Avoid deploying development or master branch commits in production environments; use stable, security-patched releases only. 5. Monitor web server logs for suspicious upload attempts or unusual HTTP request patterns targeting import.json.php. 6. Employ web application firewalls (WAF) with custom rules to detect and block malicious upload attempts. 7. Conduct regular code audits focusing on file upload and inclusion functionalities. 8. If possible, isolate the AVideo application environment to limit the impact of potential code execution. 9. Stay updated with vendor advisories for patches or security updates addressing this vulnerability. 10. Educate developers and administrators about secure file handling practices and the risks of deploying unvetted code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2023-11-30T22:24:43.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6ed4

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 11/4/2025, 7:08:41 PM

Last updated: 12/4/2025, 3:24:54 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats