Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49864: CWE-73: External Control of File Name or Path in WWBN AVideo

0
Medium
VulnerabilityCVE-2023-49864cvecve-2023-49864cwe-73
Published: Wed Jan 10 2024 (01/10/2024, 15:48:12 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_image` parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:10:01 UTC

Technical Analysis

CVE-2023-49864 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WWBN AVideo platform, specifically in the aVideoEncoderReceiveImage.json.php script responsible for image uploads. The flaw is triggered by the downloadURL_image parameter, which accepts external input that is not properly validated or sanitized, enabling an attacker to craft a malicious HTTP request to read arbitrary files from the server's filesystem. This leads to information disclosure, potentially exposing sensitive configuration files, credentials, or other private data stored on the server. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and it affects the dev master commit 15fed957fb version of AVideo. The CVSS 3.1 score is 6.5, reflecting a medium severity with a high confidentiality impact (C:H), no integrity (I:N), and no availability (A:N) impact. Although no public exploits have been reported, the vulnerability poses a risk to organizations using this version of AVideo, particularly in environments where sensitive data is stored or where the server is accessible to untrusted users. The root cause is insufficient validation of file path inputs, allowing directory traversal or arbitrary file read attacks. Remediation would involve implementing strict input validation, sanitizing the downloadURL_image parameter, and applying access controls to limit exposure.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information such as internal configuration files, user data, or credentials stored on AVideo servers. This exposure could facilitate further attacks, including privilege escalation or lateral movement within the network. Organizations relying on AVideo for video content management or streaming services may face confidentiality breaches, potentially violating GDPR requirements regarding data protection and privacy. The impact is particularly significant for entities handling sensitive or regulated data, such as media companies, educational institutions, or government agencies using AVideo. While the vulnerability does not directly affect system integrity or availability, the loss of confidentiality can damage organizational reputation and lead to compliance penalties. Since exploitation requires some level of authentication, insider threats or compromised accounts pose a higher risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2023-49864, organizations should first verify if they are running the affected dev master commit 15fed957fb version of WWBN AVideo and upgrade to a patched or stable release once available. In the absence of an official patch, implement strict input validation and sanitization on the downloadURL_image parameter to prevent directory traversal or arbitrary file path manipulation. Employ allowlisting of acceptable file paths or names and reject any input containing suspicious characters such as '../' sequences. Restrict access to the aVideoEncoderReceiveImage.json.php endpoint to trusted users or internal networks only, using network segmentation and firewall rules. Monitor logs for unusual access patterns or attempts to exploit this parameter. Additionally, enforce the principle of least privilege on accounts with access to the AVideo platform to reduce the risk of exploitation by low-privilege users. Conduct regular security assessments and code reviews focusing on file handling functions to identify similar vulnerabilities. Finally, ensure compliance with data protection regulations by safeguarding sensitive information exposed through this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-11-30T18:43:03.139Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a473b6d939959c8021c0a

Added to database: 11/4/2025, 6:34:35 PM

Last enriched: 11/4/2025, 7:10:01 PM

Last updated: 12/20/2025, 5:15:02 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats