CVE-2023-32073

Source
https://cve.org/CVERecord?id=CVE-2023-32073
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32073.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32073
Aliases
Published
2023-05-12T13:34:34.164Z
Modified
2026-02-19T01:40:19.875908Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
AVideo command injection vulnerability
Details

WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at plugin/CloneSite/cloneClient.json.php which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-77"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32073.json"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32073.json"