
We found results for “”
CVE-2023-49715
Good to know:

Date: January 10, 2024
A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Unrestricted Upload of File with Dangerous Type
CWE-434Top Fix

Upgrade Version
Upgrade to version wwbn/avideo - dev-dependabot/npm_and_yarn/js-cookie-3.0.5;wwbn/avideo - dev-julzxcapz-yp2;wwbn/avideo - dev-dependabot/composer/stripe/stripe-php-10.12.1;wwbn/avideo - dev-akhilleusuggo-patch-9;wwbn/avideo - dev-dependabot/npm_and_yarn/videojs-contrib-ads-7.3.1;wwbn/avideo - dev-dependabot/composer/aws/aws-sdk-php-3.261.4;wwbn/avideo - 14.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | LOW |
Availability (A): | NONE |