SB2019090809 - Multiple vulnerabilities in Bludit
Published: September 8, 2019 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Improper Restriction of Excessive Authentication Attempts (CVE-ID: CVE-2019-17240)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
2) Code Injection (CVE-ID: CVE-2019-16113)
The vulnerability allows a remote authenticated user to execute arbitrary code.
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
Remediation
Install update from vendor's website.
References
- https://github.com/bludit/bludit/pull/1090
- https://rastating.github.io/bludit-brute-force-mitigation-bypass/
- http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html
- http://packetstormsecurity.com/files/157988/Bludit-3.9.12-Directory-Traversal.html
- http://packetstormsecurity.com/files/158569/Bludit-3.9.2-Directory-Traversal.html
- https://github.com/bludit/bludit/issues/1081