GHSA-pgvh-p3g4-86jw

Suggest an improvement
Source
https://github.com/advisories/GHSA-pgvh-p3g4-86jw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-pgvh-p3g4-86jw/GHSA-pgvh-p3g4-86jw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pgvh-p3g4-86jw
Aliases
Published
2023-02-02T01:32:42Z
Modified
2024-02-16T08:15:12.871845Z
Severity
  • 9.6 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
AVideo contains Command injection when embedding a video link
Details

Impact:

An attacker could execute remote code on a system running wwbn/avideo

Step to Reproduce:

  1. Go to the My Videos tab

https://demo.avideo.com/mvideos

  1. Click "Embed a video link"

Append a command to the url as a query string. eg. ?whoami

then click Save

This issue has been resolved in commit 236228f15

Database specific
{
    "nvd_published_at": "2023-04-25T22:15:09Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-02-02T01:32:42Z"
}
References

Affected packages

Packagist / wwbn/avideo

Package

Name
wwbn/avideo
Purl
pkg:composer/wwbn/avideo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.4

Affected versions

10.*

10.4
10.8

Other

11

11.*

11.1
11.1.1
11.5
11.6