Rapid7 Vulnerability & Exploit Database

AVideo WWBNIndex Plugin Unauthenticated RCE

Back to Search

AVideo WWBNIndex Plugin Unauthenticated RCE

Disclosed
04/09/2024
Created
05/21/2024

Description

This module exploits an unauthenticated remote code execution (RCE) vulnerability in the WWBNIndex plugin of the AVideo platform. The vulnerability exists within the `submitIndex.php` file, where user-supplied input is passed directly to the `require()` function without proper sanitization. By exploiting this, an attacker can leverage the PHP filter chaining technique to execute arbitrary PHP code on the server. This allows for the execution of commands and control over the affected system. The exploit is particularly dangerous because it does not require authentication, making it possible for any remote attacker to exploit this vulnerability.

Author(s)

  • Valentin Lobstein

Platform

Linux,PHP,Unix,Windows

Architectures

php, cmd

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/avideo_wwbnindex_unauth_rce
msf exploit(avideo_wwbnindex_unauth_rce) > show targets
    ...targets...
msf exploit(avideo_wwbnindex_unauth_rce) > set TARGET < target-id >
msf exploit(avideo_wwbnindex_unauth_rce) > show options
    ...show and set options...
msf exploit(avideo_wwbnindex_unauth_rce) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;