ID CVE-2018-9206
Summary Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
References
Vulnerable Configurations
  • cpe:2.3:a:jquery-file-upload_project:jquery-file-upload:9.22.0
    cpe:2.3:a:jquery-file-upload_project:jquery-file-upload:9.22.0
CVSS
Base: 7.5
Impact:
Exploitability:
CWE CWE-434
CAPEC
  • Accessing Functionality Not Properly Constrained by ACLs
    In applications, particularly web applications, access to functionality is mitigated by the authorization framework, whose job it is to map ACLs to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be available only to users at a higher privilege level, can access management sections of the application or can run queries for data that he is otherwise not supposed to.
  • Privilege Abuse
    An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources. If access control mechanisms are absent or misconfigured, a user may be able to access resources that are intended only for higher level users. An adversary may be able to exploit this to utilize a less trusted account to gain information and perform activities reserved for more trusted accounts. This attack differs from privilege escalation and other privilege stealing attacks in that the adversary never actually escalates their privileges but instead is able to use a lesser degree of privilege to access resources that should be (but are not) reserved for higher privilege accounts. Likewise, the adversary does not exploit trust or subvert systems - all control functionality is working as configured but the configuration does not adequately protect sensitive resources at an appropriate level.
d2sec via4
name jQuery File Upload
url http://www.d2sec.com/exploits/jquery_file_upload.html
exploit-db via4
  • file exploits/php/webapps/46182.py
    id EDB-ID:46182
    last seen 2019-01-16
    modified 2019-01-16
    platform php
    port 80
    published 2019-01-16
    reporter Exploit-DB
    source https://www.exploit-db.com/download/46182
    title Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
    type webapps
  • file exploits/php/remote/45790.rb
    id EDB-ID:45790
    last seen 2018-11-30
    modified 2018-11-06
    platform php
    port
    published 2018-11-06
    reporter Exploit-DB
    source https://www.exploit-db.com/download/45790
    title blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit)
    type remote
metasploit via4
description This module exploits an arbitrary file upload in the sample PHP upload handler for blueimp's jQuery File Upload widget in versions <= 9.22.0. Due to a default configuration in Apache 2.3.9+, the widget's .htaccess file may be disabled, enabling exploitation of this vulnerability. This vulnerability has been exploited in the wild since at least 2015 and was publicly disclosed to the vendor in 2018. It has been present since the .htaccess change in Apache 2.3.9. This module provides a generic exploit against the jQuery widget.
id MSF:EXPLOIT/UNIX/WEBAPP/JQUERY_FILE_UPLOAD
last seen 2019-01-15
modified 2018-11-16
published 2018-10-23
reliability Excellent
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/jquery_file_upload.rb
title blueimp's jQuery (Arbitrary) File Upload
nessus via4
  • NASL family CGI abuses
    NASL id ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2019.NASL
    description According to its self-reported version number, the Oracle Primavera Unifier installation running on the remote web server is 16.x prior to 16.2.15.6 or 17.x prior to 17.12.9.2 or 18.x prior to 18.8.4.1. It is, therefore, affected by multiple vulnerabilities: - An arbitrary file upload vulnerability exists in Blueimp jQuery-File-Upload. An unauthenticated, remote attacker can exploit this to upload arbitrary files on the remote host subject to the privileges of the user. - A remote command execution vulnerability exists in jackson-databind due to a failure to block various classes from polymorphic deserialization. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2018-14718, CVE-2018-14719 CVE-2018-14720, CVE-2018-14721) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-01-19
    modified 2019-01-18
    plugin id 121251
    published 2019-01-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121251
    title Oracle Primavera Unifier Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family CGI abuses
    NASL id JQUERY_FILEUPLOAD_RCE.NASL
    description The version of jQuery-File-Upload running on the remote host is affected by an arbitrary file upload vulnerability. An unauthenticated attacker could leverage this vulnerability to gain access to the host in the context of the web application user.
    last seen 2019-01-16
    modified 2018-11-14
    plugin id 118310
    published 2018-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118310
    title jQuery-File-Upload Arbitrary File Upload Vulnerability (Remote Check)
packetstorm via4
refmap via4
bid
  • 105679
  • 106629
confirm https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
misc
Last major update 11-10-2018 - 11:29
Published 11-10-2018 - 11:29
Last modified 30-01-2019 - 10:29
Back to Top