Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-30854 β€” AI Deep Analysis Summary

CVSS 8.8 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OS Command Injection in WWBN AVideo. <br>πŸ’₯ **Consequences**: Attackers can achieve **Remote Code Execution (RCE)** on the server. Critical impact on Confidentiality, Integrity, and Availability.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-78 (Improper Neutralization of Special Elements used in an OS Command). <br>πŸ” **Flaw**: Unsafe use of `exec()` with user-controlled input (`cloneSiteURL`) in the Clone Site feature.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: WWBN. <br>πŸ“‰ **Affected**: **AVideo versions < 12.4** (specifically noted as < 12.3 in PoC). <br>πŸ”§ **Component**: `/plugin/CloneSite/cloneClient.json.php` endpoint.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: System-level execution (via `wget`/`exec`). <br>πŸ“‚ **Data**: Full access to server files, databases, and potential lateral movement. High severity (CVSS H).

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Threshold**: **Medium**. Requires **Authentication** (Admin privileges). <br>βš™οΈ **Config**: Must have access to the admin panel to use the 'Clone Site' feature.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Exploit**: **Yes**. Public PoC available on GitHub (`jmrcsnchz/CVE-2023-30854`). <br>🌍 **Wild Exploitation**: Possible for authenticated users. Not yet confirmed as widespread automated exploit, but code is public.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for AVideo versions < 12.4. <br>πŸ•΅οΈ **Feature**: Check if 'Clone Site' plugin is enabled. <br>πŸ“‘ **WAF**: Look for command injection patterns in `/plugin/CloneSite/` requests.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: **Yes**. Official advisory released (GHSA-6vrj-ph27-qfp3). <br>⬆️ **Action**: Upgrade to **AVideo 12.4** or later immediately.

Q9What if no patch? (Workaround)

🚫 **Workaround**: Disable the **Clone Site** plugin if not needed. <br>πŸ”’ **Access Control**: Restrict admin panel access strictly. Remove unnecessary admin accounts.

Q10Is it urgent? (Priority Suggestion)

⚑ **Priority**: **HIGH**. <br>πŸ“… **Published**: April 2023. <br>πŸ”₯ **Reason**: RCE is critical. Even though auth is required, admin compromise is common. Patch immediately.