CVE-2020-23489: AVideo vulnerable to Improper Privilege Management
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.91048%
CWE
Published
5/24/2022
Updated
2/3/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wwbn/avideo | composer | < 8.9 | 8.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper validation in objects/import.json.php. The code uses $_POST['fileURI'] to construct a file path and deletes it via unlink($source) if the user has upload privileges. Attackers could exploit this to delete configuration.php, which disables security checks. The patch added a regex check for '.mp4' to prevent arbitrary file paths. The procedural code in this file directly handles the insecure file deletion logic, making it the primary vulnerable component.