Skip to main content

CVE-2023-49715: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo

Medium
VulnerabilityCVE-2023-49715cvecve-2023-49715cwe-434
Published: Wed Jan 10 2024 (01/10/2024, 15:48:10 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 09:40:50 UTC

Technical Analysis

CVE-2023-49715 is a medium-severity vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the WWBN AVideo platform, specifically in the import.json.php temporary copy functionality found in the dev master commit 15fed957fb version. The core issue is that the application does not properly restrict the types of files that can be uploaded, allowing an attacker to upload malicious PHP files. When this vulnerability is chained with a Local File Inclusion (LFI) vulnerability, it can lead to arbitrary code execution on the affected server. The attack vector involves sending a specially crafted series of HTTP requests to exploit the unrestricted file upload and then leveraging the LFI to execute the uploaded malicious code. The CVSS score of 4.3 reflects a medium severity, with the vector indicating network attack vector, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that the vulnerability is either newly disclosed or not widely exploited. The vulnerability requires an attacker to have some level of privileges (PR:L), which limits the attack surface somewhat but still poses a significant risk if an attacker can gain initial access or if the application is exposed to untrusted users.

Potential Impact

For European organizations using WWBN AVideo, this vulnerability poses a risk primarily to the integrity of their systems. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized control over the affected servers. This could result in defacement, data tampering, or using the compromised server as a pivot point for further attacks within the network. Although confidentiality and availability impacts are rated as none, the integrity compromise alone can have severe operational and reputational consequences. Organizations that rely on AVideo for video content management or streaming services could face service disruptions or data integrity issues. Given the medium CVSS score and the requirement for some privileges, the threat is more pronounced in environments where user access controls are weak or where attackers can escalate privileges. European organizations with public-facing AVideo instances or those integrated into critical workflows should consider this vulnerability seriously to prevent potential exploitation.

Mitigation Recommendations

To mitigate CVE-2023-49715, European organizations should first verify if they are running the affected dev master commit 15fed957fb version of WWBN AVideo and plan to upgrade to a fixed version once available. In the interim, organizations should implement strict file upload validation controls, ensuring that only allowed file types are accepted and that uploaded files are scanned for malicious content. Restricting upload directories and disabling execution permissions on upload folders can prevent uploaded PHP files from being executed. Additionally, organizations should audit and patch any Local File Inclusion vulnerabilities in their environment to prevent chaining attacks. Employing web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts and LFI exploitation attempts can provide an additional layer of defense. Monitoring logs for unusual HTTP requests related to file uploads or LFI attempts is also recommended. Finally, enforcing the principle of least privilege for users and services interacting with the upload functionality will reduce the risk of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2023-11-30T22:24:43.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6ed4

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/4/2025, 9:40:50 AM

Last updated: 8/15/2025, 7:07:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats