PT-2026-30336 · Packagist · Wwbn Avideo
Published
2026-04-04
·
Updated
2026-04-04
·
CVE-2026-35452
CVSS v3.1
5.3
Medium
| AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Summary
The
plugin/CloneSite/client.log.php endpoint serves the clone operation log file without any authentication. Every other endpoint in the CloneSite plugin directory enforces User::isAdmin(). The log contains internal filesystem paths, remote server URLs, and SSH connection metadata.Details
The entire file at
plugin/CloneSite/client.log.php:<?php
include '../../videos/cache/clones/client.log';
No authentication check. The log file is populated by
cloneClient.json.php which writes operational details during clone operations:// plugin/CloneSite/cloneClient.json.php:118
$log->add("Clone (2 of {$totalSteps}): Geting MySQL Dump file [$cmd]");
The
$cmd variable contains wget commands with internal filesystem paths, and rsync command templates with SSH connection details (username, IP, port).Compare with sibling endpoints:
plugin/CloneSite/index.phpchecksUser::isAdmin()plugin/CloneSite/changeStatus.json.phpchecksUser::isAdmin()plugin/CloneSite/clones.json.phpchecksUser::isAdmin()plugin/CloneSite/delete.json.phpchecksUser::isAdmin()
Proof of Concept
curl "https://your-avideo-instance.com/plugin/CloneSite/client.log.php"
If the CloneSite feature has been used, the response contains wget commands, filesystem paths, SSH metadata, and SQL dump file locations.
Impact
Unauthenticated disclosure of internal infrastructure details that could aid targeted attacks against the clone source server.
Recommended Fix
Add an admin authentication check at
plugin/CloneSite/client.log.php, before the include:require once '../../videos/configuration.php';
if (!User::isAdmin()) {
http response code(403);
die('Access denied');
}
Found by aisafe.io
Fix
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Wwbn Avideo