mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
19 lines
1.0 KiB
Markdown
19 lines
1.0 KiB
Markdown
![]() |
### [CVE-2023-32073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32073)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/jmrcsnchz/CVE-2023-32073
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
|