exposed-jquery-file-upload: BlueImp jQuery-File-Upload - Arbitrary File Upload

日期: 2025-08-01 | 影响软件: BlueImp jQuery-File-Upload | POC: 已公开

漏洞描述

BlueImp jQuery-File-Upload does not require validation to upload files to the server and does not exclude file types, which can lead to a remote code execution vulnerability.

PoC代码[已公开]

id: exposed-jquery-file-upload

info:
  name: BlueImp jQuery-File-Upload - Arbitrary File Upload
  author: dhiyaneshDk
  severity: critical
  description: BlueImp jQuery-File-Upload does not require validation to upload files to the server and  does not exclude file types, which can lead to a remote code execution vulnerability.
  reference:
    - https://www.exploit-db.com/exploits/45584
    - https://github.com/blueimp/jQuery-File-Upload/blob/master/server/php/UploadHandler.php
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cwe-id: CWE-434
  metadata:
    max-request: 1
  tags: exposure,jquery,edb,misconfig,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/jquery-file-upload/server/php/"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - '^{\"files\":'
        part: body

      - type: word
        words:
          - "text/plain"
        part: header
# digest: 4b0a00483046022100b94b260d4f9cbed33e0edfd1a865c5506e16e2c34486d62880955fd63d97cf73022100959b91ad139b88a83033dc488d100915fb46a0711442264da10456d1ea8d3454:922c64590222798bb761d5b6d8e72950