7.5
CVSSv2

CVE-2018-9206

Published: 11/10/2018 Updated: 11/09/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 767
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jquery file upload project jquery file upload

Exploits

# Title: jQuery-File-Upload 9220 - Arbitrary File Upload # Author: Larry W Cashdollar, @_larry0 # Date: 2018-10-09 # Vendor: githubcom/blueimp # Download Site: githubcom/blueimp/jQuery-File-Upload/releases # CVE-ID: N/A # Vulnerability: # The code in githubcom/blueimp/jQuery-File-Upload/blob/master/server/php/UploadHa ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule &lt; Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::PhpEXE def initialize(info = {}) super(update_info(info, ...
# Exploit Title: Exploit for Blueimp's jQuery File Upload &lt;= 9220 CVE-2018-9206 # Google Dork: inurl: /jquery-file-upload/server/php # Date: 1/15/2019 # Exploit Author: Larry W Cashdollar # Vendor Homepage: wwwvapidlabscom # Software Link: [download link if available] # Version: &lt;= 9220 # Tested on: Linux # CVE : CVE-2018-9206 ...
This Metasploit module exploits an arbitrary file upload in the sample PHP upload handler for blueimp's jQuery File Upload widget in versions 9220 and below Due to a default configuration in Apache 239+, the widget's htaccess file may be disabled, enabling exploitation of this vulnerability This vulnerability has been exploited in the wild s ...
Blueimp jQuery File Upload versions 9220 and below suffer from a remote file upload vulnerability ...

Github Repositories

A Python PoC for CVE-2018-9206

PoC for CVE-2018-9206 About Based on the original Poc Usage usage: runpy [-h] [-p PREFIX] [-u USER_AGENT] host CVE-2018-9206 PoC positional arguments: host the host to check optional arguments: -h, --help show this help message and exit -p PREFIX, --prefix PREFIX The prefix for the path -u USER_AGENT, --user-agent

An article about jQuery file upload to RCE

jQuery-vulnrability An article about jQuery file upload to RCE jQuery-File-Upload jQuery-File-Upload is a plugin for the jQuery library that allows you to upload files to the server and receive the results This plugin has various features, including uploading multiple files at the same time, previewing images before uploading, canceling uploads, and supporting drag and drop fi

cve-2018-9206

CVE-2018-9206 This is part of Cved: a tool to manage vulnerable docker containers Cved: githubcom/git-rep-src/cved Image source: githubcom/cved-sources/cve-2018-9206 Image author: githubcom/lcashdol/Exploits/tree/master/CVE-2018-9206

A weaponized version of CVE-2018-9206

JQShell A weaponized version of CVE-2018-9206 Disclaimer Using this agianst servers you dont control, is illegal in most countries The author claims no responsibility for the actions of those who use this software for illegal purposes This software is intended for educational use only No servers were illegally pwned in the making of this software Features Single Target Mul

[PROJECT ARCHIVED, DO NOT USE IN PRODUCTION] This plugin is created for easy adding files from Yandex Disk service to posts or pages of your wordpress site.

The project is ARCHIVED and no longer maintained jQuery-File-Upload dependency can be vulnerable Please use on your own risk Please also note the following info about githubcom/blueimp/jQuery-File-Upload plugin, which is included into the plugin (I received it from Igor Debatur, uploadcarecom/ ): [] a major security issue that affects websites and appli

PoC for CVE-2018-9206 About Based on the following: original Poc Python Poc Usage usage: BlueimpScanpy [-h] [-p PREFIX] [-u USER_AGENT] host CVE-2018-9206 PoC, initial release by Den1al, enhanced by NopSec positional arguments: host the host to check, host:port, or CIDR range optional arguments: -h, --help show this help message and exit -p