Summary
The plugin/CloneSite/client.log.php endpoint serves the clone operation log file without any authentication. Every other endpoint in the CloneSite plugin directory enforces User::isAdmin(). The log contains internal filesystem paths, remote server URLs, and SSH connection metadata.
Details
The entire file at plugin/CloneSite/client.log.php:
<?php
include '../../videos/cache/clones/client.log';
No authentication check. The log file is populated by cloneClient.json.php which writes operational details during clone operations:
// plugin/CloneSite/cloneClient.json.php:118
$log->add("Clone (2 of {$totalSteps}): Geting MySQL Dump file [$cmd]");
The $cmd variable contains wget commands with internal filesystem paths, and rsync command templates with SSH connection details (username, IP, port).
Compare with sibling endpoints:
plugin/CloneSite/index.php checks User::isAdmin()
plugin/CloneSite/changeStatus.json.php checks User::isAdmin()
plugin/CloneSite/clones.json.php checks User::isAdmin()
plugin/CloneSite/delete.json.php checks User::isAdmin()
Proof of Concept
curl "https://your-avideo-instance.com/plugin/CloneSite/client.log.php"
If the CloneSite feature has been used, the response contains wget commands, filesystem paths, SSH metadata, and SQL dump file locations.
Impact
Unauthenticated disclosure of internal infrastructure details that could aid targeted attacks against the clone source server.
Recommended Fix
Add an admin authentication check at plugin/CloneSite/client.log.php, before the include:
require_once '../../videos/configuration.php';
if (!User::isAdmin()) {
http_response_code(403);
die('Access denied');
}
Found by aisafe.io
References
Summary
The
plugin/CloneSite/client.log.phpendpoint serves the clone operation log file without any authentication. Every other endpoint in the CloneSite plugin directory enforcesUser::isAdmin(). The log contains internal filesystem paths, remote server URLs, and SSH connection metadata.Details
The entire file at
plugin/CloneSite/client.log.php:No authentication check. The log file is populated by
cloneClient.json.phpwhich writes operational details during clone operations:The
$cmdvariable contains wget commands with internal filesystem paths, and rsync command templates with SSH connection details (username, IP, port).Compare with sibling endpoints:
plugin/CloneSite/index.phpchecksUser::isAdmin()plugin/CloneSite/changeStatus.json.phpchecksUser::isAdmin()plugin/CloneSite/clones.json.phpchecksUser::isAdmin()plugin/CloneSite/delete.json.phpchecksUser::isAdmin()Proof of Concept
curl "https://your-avideo-instance.com/plugin/CloneSite/client.log.php"If the CloneSite feature has been used, the response contains wget commands, filesystem paths, SSH metadata, and SQL dump file locations.
Impact
Unauthenticated disclosure of internal infrastructure details that could aid targeted attacks against the clone source server.
Recommended Fix
Add an admin authentication check at
plugin/CloneSite/client.log.php, before the include:Found by aisafe.io
References