First published: Sun Sep 08 2019(Updated: )
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bludit | =3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16113 is a vulnerability in Bludit 3.9.2 that allows remote code execution via bl-kernel/ajax/upload-images.php.
CVE-2019-16113 has a severity level of 8.8 (High).
CVE-2019-16113 allows PHP code to be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
To fix CVE-2019-16113, update your Bludit installation to version 3.9.3 or later.
You can find more information about CVE-2019-16113 on the following references: [Reference 1](http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html), [Reference 2](http://packetstormsecurity.com/files/157988/Bludit-3.9.12-Directory-Traversal.html), [Reference 3](http://packetstormsecurity.com/files/158569/Bludit-3.9.2-Directory-Traversal.html).