Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/bludit/bludit/issues/1081 | third party advisory exploit |
http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/157988/Bludit-3.9.12-Directory-Traversal.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/158569/Bludit-3.9.2-Directory-Traversal.html | exploit vdb entry third party advisory |