跳转到帖子

AVideo WWBNIndex Plugin Unauthenticated RCE

recommended_posts

发布于
  • Members

AVideo WWBNIndex Plugin Unauthenticated RCE

Disclosed
04/09/2024
Created
05/21/2024

Description

This module exploits an unauthenticated remote code execution (RCE) vulnerability in the WWBNIndex plugin of the AVideo platform. The vulnerability exists within the `submitIndex.php` file, where user-supplied input is passed directly to the `require()` function without proper sanitization. By exploiting this, an attacker can leverage the PHP filter chaining technique to execute arbitrary PHP code on the server. This allows for the execution of commands and control over the affected system. The exploit is particularly dangerous because it does not require authentication, making it possible for any remote attacker to exploit this vulnerability.

Author(s)

  • Valentin Lobstein

Platform

Linux,PHP,Unix,Windows

Architectures

php, cmd

Development

  • Source Code
  • History
  • 查看数 706
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…