Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49862: CWE-73: External Control of File Name or Path in WWBN AVideo

0
Medium
VulnerabilityCVE-2023-49862cvecve-2023-49862cwe-73
Published: Wed Jan 10 2024 (01/10/2024, 15:48:12 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_gifimage` parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:09:28 UTC

Technical Analysis

CVE-2023-49862 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting the WWBN AVideo platform, an open-source video hosting and streaming solution. The vulnerability exists in the aVideoEncoderReceiveImage.json.php script, which handles image uploads. Specifically, the downloadURL_gifimage parameter is improperly validated, allowing an attacker to craft a malicious HTTP request that causes the server to read arbitrary files. This can lead to information disclosure of sensitive files on the server, potentially exposing configuration files, credentials, or other critical data. The vulnerability requires the attacker to have low-level privileges (PR:L), meaning some form of authentication is necessary, but no user interaction is required (UI:N). The attack vector is network-based (AV:N), and the vulnerability does not affect integrity or availability, only confidentiality. The affected version is the dev master commit 15fed957fb, indicating this is a development branch rather than a stable release. No patches have been linked yet, and no known exploits have been reported in the wild. The vulnerability's medium severity (CVSS 6.5) reflects the significant confidentiality impact balanced against the requirement for authentication and limited scope. This flaw could be leveraged by attackers who have gained low-level access to escalate their information gathering capabilities within the affected environment.

Potential Impact

For European organizations using WWBN AVideo, particularly those running development or testing instances with the affected commit, this vulnerability poses a risk of sensitive information leakage. Confidential data such as server configuration files, credentials, or proprietary media metadata could be exposed, potentially aiding further attacks like privilege escalation or lateral movement. Media companies, educational institutions, or enterprises hosting internal video platforms may be impacted. Although the vulnerability requires authenticated access, insider threats or compromised low-privilege accounts could exploit it. The impact on confidentiality could lead to regulatory compliance issues under GDPR if personal data is exposed. However, since the vulnerability does not affect integrity or availability, direct disruption of services is unlikely. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits given time.

Mitigation Recommendations

European organizations should immediately audit their WWBN AVideo deployments to identify if the affected dev master commit 15fed957fb is in use, particularly in development or staging environments. Restrict access to the aVideoEncoderReceiveImage.json.php endpoint to trusted users and networks, employing network segmentation and strong authentication controls. Implement strict input validation and sanitization for the downloadURL_gifimage parameter to prevent path traversal or arbitrary file read attempts. Monitor logs for unusual access patterns or attempts to exploit this parameter. Since no official patch is currently available, consider rolling back to a stable, unaffected version or applying custom fixes to validate and sanitize inputs. Educate developers and administrators about the risk and ensure that development branches are not exposed in production environments. Prepare to apply vendor patches promptly once released. Additionally, enforce the principle of least privilege for user accounts to limit the potential for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-11-30T18:43:03.139Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a473b6d939959c8021c02

Added to database: 11/4/2025, 6:34:35 PM

Last enriched: 11/4/2025, 7:09:28 PM

Last updated: 11/5/2025, 1:50:37 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats