CVE-2023-49738

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to read arbitrary files on WWBN AVideo servers by exploiting improper input validation in the image404Raw.php script. It affects WWBN AVideo installations running dev master commit 15fed957fb or related vulnerable versions. Attackers can access sensitive system files without authentication.

💻 Affected Systems

Products:
  • WWBN AVideo
Versions: dev master commit 15fed957fb and likely related versions
Operating Systems: Any OS running WWBN AVideo
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the core application code and affects default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive configuration files, SSH keys, database credentials, or other critical system files leading to further exploitation.

🟠

Likely Case

Information disclosure of sensitive files including configuration files, user data, or application source code.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation preventing access to critical system files.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via HTTP requests and requires no authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but may have additional network controls limiting exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only HTTP requests with crafted parameters and has been publicly disclosed with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WWBN AVideo repository for updates after commit 15fed957fb

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1881

Restart Required: No

Instructions:

1. Update WWBN AVideo to latest version. 2. Apply any security patches from the vendor. 3. Verify the image404Raw.php script has proper input validation.

🔧 Temporary Workarounds

Disable or restrict image404Raw.php

linux

Temporarily disable or restrict access to the vulnerable script

mv image404Raw.php image404Raw.php.disabled
chmod 000 image404Raw.php

Web server access control

all

Use web server configuration to block access to the vulnerable endpoint

# Apache: <Location /image404Raw.php> Require all denied </Location>
# Nginx: location ~* /image404Raw\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement strict web application firewall rules to block requests to image404Raw.php with suspicious parameters
  • Restrict file system permissions to limit what files the web server user can read

🔍 How to Verify

Check if Vulnerable:

Test if image404Raw.php accepts file path traversal parameters like ?file=../../etc/passwd

Check Version:

Check WWBN AVideo version in admin panel or git commit history

Verify Fix Applied:

Verify the script no longer accepts arbitrary file paths and returns proper error messages

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to image404Raw.php with suspicious file parameters
  • Multiple failed file access attempts

Network Indicators:

  • Unusual file path patterns in HTTP requests
  • Requests attempting to access system files

SIEM Query:

source="web_logs" AND uri="*image404Raw.php*" AND (query="*../*" OR query="*file=*")

🔗 References

📤 Share & Export