CVE-2023-49715: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo
A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-49715 is a medium-severity vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the WWBN AVideo platform, specifically in the import.json.php temporary copy functionality found in the dev master commit 15fed957fb version. The core issue is that the application does not properly restrict the types of files that can be uploaded, allowing an attacker to upload malicious PHP files. When this vulnerability is chained with a Local File Inclusion (LFI) vulnerability, it can lead to arbitrary code execution on the affected server. The attack vector involves sending a specially crafted series of HTTP requests to exploit the unrestricted file upload and then leveraging the LFI to execute the uploaded malicious code. The CVSS score of 4.3 reflects a medium severity, with the vector indicating network attack vector, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that the vulnerability is either newly disclosed or not widely exploited. The vulnerability requires an attacker to have some level of privileges (PR:L), which limits the attack surface somewhat but still poses a significant risk if an attacker can gain initial access or if the application is exposed to untrusted users.
Potential Impact
For European organizations using WWBN AVideo, this vulnerability poses a risk primarily to the integrity of their systems. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized control over the affected servers. This could result in defacement, data tampering, or using the compromised server as a pivot point for further attacks within the network. Although confidentiality and availability impacts are rated as none, the integrity compromise alone can have severe operational and reputational consequences. Organizations that rely on AVideo for video content management or streaming services could face service disruptions or data integrity issues. Given the medium CVSS score and the requirement for some privileges, the threat is more pronounced in environments where user access controls are weak or where attackers can escalate privileges. European organizations with public-facing AVideo instances or those integrated into critical workflows should consider this vulnerability seriously to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2023-49715, European organizations should first verify if they are running the affected dev master commit 15fed957fb version of WWBN AVideo and plan to upgrade to a fixed version once available. In the interim, organizations should implement strict file upload validation controls, ensuring that only allowed file types are accepted and that uploaded files are scanned for malicious content. Restricting upload directories and disabling execution permissions on upload folders can prevent uploaded PHP files from being executed. Additionally, organizations should audit and patch any Local File Inclusion vulnerabilities in their environment to prevent chaining attacks. Employing web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts and LFI exploitation attempts can provide an additional layer of defense. Monitoring logs for unusual HTTP requests related to file uploads or LFI attempts is also recommended. Finally, enforcing the principle of least privilege for users and services interacting with the upload functionality will reduce the risk of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2023-49715: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo
Description
A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-49715 is a medium-severity vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the WWBN AVideo platform, specifically in the import.json.php temporary copy functionality found in the dev master commit 15fed957fb version. The core issue is that the application does not properly restrict the types of files that can be uploaded, allowing an attacker to upload malicious PHP files. When this vulnerability is chained with a Local File Inclusion (LFI) vulnerability, it can lead to arbitrary code execution on the affected server. The attack vector involves sending a specially crafted series of HTTP requests to exploit the unrestricted file upload and then leveraging the LFI to execute the uploaded malicious code. The CVSS score of 4.3 reflects a medium severity, with the vector indicating network attack vector, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that the vulnerability is either newly disclosed or not widely exploited. The vulnerability requires an attacker to have some level of privileges (PR:L), which limits the attack surface somewhat but still poses a significant risk if an attacker can gain initial access or if the application is exposed to untrusted users.
Potential Impact
For European organizations using WWBN AVideo, this vulnerability poses a risk primarily to the integrity of their systems. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized control over the affected servers. This could result in defacement, data tampering, or using the compromised server as a pivot point for further attacks within the network. Although confidentiality and availability impacts are rated as none, the integrity compromise alone can have severe operational and reputational consequences. Organizations that rely on AVideo for video content management or streaming services could face service disruptions or data integrity issues. Given the medium CVSS score and the requirement for some privileges, the threat is more pronounced in environments where user access controls are weak or where attackers can escalate privileges. European organizations with public-facing AVideo instances or those integrated into critical workflows should consider this vulnerability seriously to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2023-49715, European organizations should first verify if they are running the affected dev master commit 15fed957fb version of WWBN AVideo and plan to upgrade to a fixed version once available. In the interim, organizations should implement strict file upload validation controls, ensuring that only allowed file types are accepted and that uploaded files are scanned for malicious content. Restricting upload directories and disabling execution permissions on upload folders can prevent uploaded PHP files from being executed. Additionally, organizations should audit and patch any Local File Inclusion vulnerabilities in their environment to prevent chaining attacks. Employing web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts and LFI exploitation attempts can provide an additional layer of defense. Monitoring logs for unusual HTTP requests related to file uploads or LFI attempts is also recommended. Finally, enforcing the principle of least privilege for users and services interacting with the upload functionality will reduce the risk of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T22:24:43.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6ed4
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/4/2025, 9:40:50 AM
Last updated: 8/15/2025, 7:07:56 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.