CVE-2023-32073

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32073
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32073.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32073
Aliases
Published
2023-05-12T14:15:10Z
Modified
2024-05-23T01:27:30.946858Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at plugin/CloneSite/cloneClient.json.php which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.

References

Affected packages

Git / github.com/wwbn/avideo

Affected ranges

Type
GIT
Repo
https://github.com/wwbn/avideo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

10.*

10.4
10.8

Other

11

11.*

11.1
11.1.1
11.5
11.6

12.*

12.4

2.*

2.2
2.4
2.7

3.*

3.4
3.4.1

4.*

4.0
4.0.1
4.0.2

5.*

5.0

6.*

6.5

7.*

7.2
7.3
7.4
7.5
7.6
7.7
7.8

8.*

8.1
8.5
8.6
8.7
8.9
8.9.1