AVideo API Secret Disclosure Leads to Unauthorized Access
AVideo version 29.0 and earlier is vulnerable to unauthenticated API secret disclosure via a publicly accessible endpoint, allowing unauthorized access to protected API endpoints.
AVideo, a video-sharing platform, is vulnerable to a critical security flaw that allows unauthenticated users to access sensitive API secrets. Specifically, the objects/plugins.json.php endpoint, intended to provide plugin configuration details, inadvertently exposes the APISecret within the object_data. This vulnerability, present in versions 29.0 and earlier, allows an attacker to bypass authentication and directly interact with protected API endpoints. By extracting the APISecret, an attacker can then craft API requests to access restricted data, such as user lists, without proper authorization. This poses a significant risk to data confidentiality and integrity within AVideo installations.
Attack Chain
- An unauthenticated attacker discovers the publicly accessible
objects/plugins.json.phpendpoint. - The attacker sends an HTTP GET request to
objects/plugins.json.phpto retrieve plugin configurations. - The server responds with a JSON payload containing plugin
object_data, including theAPISecret. - The attacker extracts the
APISecretfrom the JSON response. - The attacker crafts a malicious API request to the
plugin/API/get.json.phpendpoint, including theAPISecretas an authentication token. - The attacker specifies the desired
APIName(e.g.,users_list) and other parameters (e.g.,rowCount,current) in the API request. - The server incorrectly validates the request based on the provided
APISecret. - The server responds with the requested data, granting the attacker unauthorized access to protected information.
Impact
Successful exploitation of this vulnerability grants unauthorized access to sensitive data managed by the AVideo platform. An attacker could potentially access user lists and other restricted information. The number of affected installations is currently unknown, but any instance running AVideo version 29.0 or earlier is susceptible. This can lead to data breaches, privacy violations, and potential misuse of user information.
Recommendation
- Apply the recommended fix of requiring admin authentication for the full plugin inventory/config endpoint (as suggested in the advisory).
- Deploy the Sigma rule “AVideo API Secret Disclosure Attempt” to detect attempts to access the vulnerable
objects/plugins.json.phpendpoint. - Deploy the Sigma rule “AVideo Unauthorized API Access via APISecret” to detect unauthorized API calls using a disclosed API secret.
Detection coverage 2
AVideo API Secret Disclosure Attempt
highDetects attempts to access the AVideo plugins.json.php endpoint which may expose the APISecret.
AVideo Unauthorized API Access via APISecret
criticalDetects unauthorized API access attempts using a potentially disclosed APISecret.
Detection queries are kept inside the platform. Get full rules →