CVE-2023-49863: CWE-73: External Control of File Name or Path in WWBN AVideo
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter.
AI Analysis
Technical Summary
CVE-2023-49863 is a medium-severity vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WWBN AVideo platform, specifically in the image upload functionality handled by the aVideoEncoderReceiveImage.json.php script. The vulnerability arises from insufficient validation of the downloadURL_webpimage parameter, which allows an attacker with some level of privileges to craft a specially formed HTTP request that can cause the server to read arbitrary files. This leads to information disclosure, potentially exposing sensitive server files or user data. The vulnerability affects the dev master commit 15fed957fb version of AVideo, indicating it is present in development builds or recent source code commits rather than stable releases. The CVSS v3.1 score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction. No public exploits have been reported yet, but the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The root cause is inadequate sanitization and validation of user-controlled input used in file path handling, a common security oversight in web applications dealing with file uploads or downloads. Remediation would involve validating and sanitizing the downloadURL_webpimage parameter to prevent directory traversal or arbitrary file access, restricting access to the vulnerable endpoint, and applying vendor patches once available.
Potential Impact
For European organizations, the primary impact of CVE-2023-49863 is the potential exposure of sensitive information stored on servers running the vulnerable AVideo platform. This could include configuration files, user data, or proprietary media content, leading to confidentiality breaches. While the vulnerability does not affect data integrity or system availability, the disclosure of sensitive files could facilitate further attacks or cause reputational damage. Media companies, educational institutions, or any organization using AVideo for video content management or streaming could be targeted. The requirement for some privileges to exploit the vulnerability limits the attack surface to insiders or attackers who have gained limited access, but the low complexity means that exploitation is feasible once access is obtained. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where development versions are deployed or where security controls are lax. European data protection regulations such as GDPR heighten the consequences of data exposure, potentially leading to legal and financial penalties.
Mitigation Recommendations
1. Immediately restrict access to the aVideoEncoderReceiveImage.json.php endpoint to trusted users and internal networks only, using firewall rules or web application firewalls (WAF). 2. Implement strict input validation and sanitization on the downloadURL_webpimage parameter to prevent directory traversal or arbitrary file path manipulation. 3. Avoid deploying development or master branch versions of AVideo in production environments; use stable releases that have undergone security review. 4. Monitor logs for unusual access patterns or attempts to exploit the downloadURL_webpimage parameter. 5. Apply any official patches or updates from WWBN as soon as they become available. 6. Conduct a security review of all file upload and download functionalities within AVideo to identify and remediate similar issues. 7. Educate developers and administrators about secure coding practices related to file handling. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect exploitation attempts. 9. Regularly audit user privileges to minimize the number of accounts with access rights sufficient to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2023-49863: CWE-73: External Control of File Name or Path in WWBN AVideo
Description
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter.
AI-Powered Analysis
Technical Analysis
CVE-2023-49863 is a medium-severity vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WWBN AVideo platform, specifically in the image upload functionality handled by the aVideoEncoderReceiveImage.json.php script. The vulnerability arises from insufficient validation of the downloadURL_webpimage parameter, which allows an attacker with some level of privileges to craft a specially formed HTTP request that can cause the server to read arbitrary files. This leads to information disclosure, potentially exposing sensitive server files or user data. The vulnerability affects the dev master commit 15fed957fb version of AVideo, indicating it is present in development builds or recent source code commits rather than stable releases. The CVSS v3.1 score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction. No public exploits have been reported yet, but the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The root cause is inadequate sanitization and validation of user-controlled input used in file path handling, a common security oversight in web applications dealing with file uploads or downloads. Remediation would involve validating and sanitizing the downloadURL_webpimage parameter to prevent directory traversal or arbitrary file access, restricting access to the vulnerable endpoint, and applying vendor patches once available.
Potential Impact
For European organizations, the primary impact of CVE-2023-49863 is the potential exposure of sensitive information stored on servers running the vulnerable AVideo platform. This could include configuration files, user data, or proprietary media content, leading to confidentiality breaches. While the vulnerability does not affect data integrity or system availability, the disclosure of sensitive files could facilitate further attacks or cause reputational damage. Media companies, educational institutions, or any organization using AVideo for video content management or streaming could be targeted. The requirement for some privileges to exploit the vulnerability limits the attack surface to insiders or attackers who have gained limited access, but the low complexity means that exploitation is feasible once access is obtained. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where development versions are deployed or where security controls are lax. European data protection regulations such as GDPR heighten the consequences of data exposure, potentially leading to legal and financial penalties.
Mitigation Recommendations
1. Immediately restrict access to the aVideoEncoderReceiveImage.json.php endpoint to trusted users and internal networks only, using firewall rules or web application firewalls (WAF). 2. Implement strict input validation and sanitization on the downloadURL_webpimage parameter to prevent directory traversal or arbitrary file path manipulation. 3. Avoid deploying development or master branch versions of AVideo in production environments; use stable releases that have undergone security review. 4. Monitor logs for unusual access patterns or attempts to exploit the downloadURL_webpimage parameter. 5. Apply any official patches or updates from WWBN as soon as they become available. 6. Conduct a security review of all file upload and download functionalities within AVideo to identify and remediate similar issues. 7. Educate developers and administrators about secure coding practices related to file handling. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect exploitation attempts. 9. Regularly audit user privileges to minimize the number of accounts with access rights sufficient to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T18:43:03.139Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a473b6d939959c8021c06
Added to database: 11/4/2025, 6:34:35 PM
Last enriched: 11/4/2025, 7:09:44 PM
Last updated: 12/19/2025, 4:16:37 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.