cve/2023/CVE-2023-30854.md

20 lines
947 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-30854](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30854)
![](https://img.shields.io/static/v1?label=Product&message=AVideo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%2012.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jmrcsnchz/CVE-2023-30854
- https://github.com/jmrcsnchz/CVE-2023-32073
- https://github.com/nomi-sec/PoC-in-GitHub