GHSA-HG8Q-8WQR-35XX

Vulnerability from github – Published: 2026-04-04 06:16 – Updated: 2026-04-07 14:20
VLAI?
Summary
AVideo: Unauthenticated Information Disclosure via Disabled CLI Guard in install/test.php
Details

Summary

The install/test.php diagnostic script has its CLI-only access guard disabled by commenting out the die() statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors.

Details

The disabled guard at install/test.php:5-7:

if (!isCommandLineInterface()) {
    //return die('Command Line only');
}

The script also enables verbose error reporting:

error_reporting(E_ALL);
ini_set('display_errors', '1');

It then queries VideoStatistic::getLastStatistics() and outputs the result via var_dump():

$resp = VideoStatistic::getLastStatistics(getVideos_id(), User::getId());
var_dump($resp);

The VideoStatistic object contains: ip (viewer IP address), session_id, user_agent, users_id, and JSON metadata. The display_errors=1 setting also leaks internal filesystem paths in any PHP warnings.

The install/ directory is not restricted by .htaccess (it only disables directory listing via Options -Indexes) and no web server rules block access to individual PHP files in this directory.

Proof of Concept

# Request viewer stats for video ID 1
curl "https://your-avideo-instance.com/install/test.php?videos_id=1"

Confirmed accessible on live AVideo instances (HTTP 200).

Impact

Unauthenticated disclosure of viewer IP addresses (PII under GDPR), session identifiers, and user agents. The enabled display_errors also reveals internal server paths on errors.

  • CWE: CWE-200 (Exposure of Sensitive Information)
  • Severity: Low

Recommended Fix

Uncomment the CLI guard at install/test.php:6 to restore the intended access restriction:

if (!isCommandLineInterface()) {
    return die('Command Line only');
}

Found by aisafe.io

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "wwbn/avideo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "26.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-35449"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-200"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-04-04T06:16:18Z",
    "nvd_published_at": "2026-04-06T22:16:23Z",
    "severity": "MODERATE"
  },
  "details": "## Summary\n\nThe `install/test.php` diagnostic script has its CLI-only access guard disabled by commenting out the `die()` statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors.\n\n## Details\n\nThe disabled guard at `install/test.php:5-7`:\n\n```php\nif (!isCommandLineInterface()) {\n    //return die(\u0027Command Line only\u0027);\n}\n```\n\nThe script also enables verbose error reporting:\n\n```php\nerror_reporting(E_ALL);\nini_set(\u0027display_errors\u0027, \u00271\u0027);\n```\n\nIt then queries `VideoStatistic::getLastStatistics()` and outputs the result via `var_dump()`:\n\n```php\n$resp = VideoStatistic::getLastStatistics(getVideos_id(), User::getId());\nvar_dump($resp);\n```\n\nThe `VideoStatistic` object contains: `ip` (viewer IP address), `session_id`, `user_agent`, `users_id`, and JSON metadata. The `display_errors=1` setting also leaks internal filesystem paths in any PHP warnings.\n\nThe `install/` directory is not restricted by `.htaccess` (it only disables directory listing via `Options -Indexes`) and no web server rules block access to individual PHP files in this directory.\n\n## Proof of Concept\n\n```bash\n# Request viewer stats for video ID 1\ncurl \"https://your-avideo-instance.com/install/test.php?videos_id=1\"\n```\n\nConfirmed accessible on live AVideo instances (HTTP 200).\n\n## Impact\n\nUnauthenticated disclosure of viewer IP addresses (PII under GDPR), session identifiers, and user agents. The enabled `display_errors` also reveals internal server paths on errors.\n\n- **CWE**: CWE-200 (Exposure of Sensitive Information)\n- **Severity**: Low\n\n## Recommended Fix\n\nUncomment the CLI guard at `install/test.php:6` to restore the intended access restriction:\n\n```php\nif (!isCommandLineInterface()) {\n    return die(\u0027Command Line only\u0027);\n}\n```\n\n---\n*Found by [aisafe.io](https://aisafe.io)*",
  "id": "GHSA-hg8q-8wqr-35xx",
  "modified": "2026-04-07T14:20:47Z",
  "published": "2026-04-04T06:16:18Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-hg8q-8wqr-35xx"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35449"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/WWBN/AVideo"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "AVideo: Unauthenticated Information Disclosure via Disabled CLI Guard in install/test.php"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…