0-Day in jQuery Plugin Impacts Thousands of Applications
#1
Quote:Thousands of projects are possibly impacted by a jQuery File Upload plugin vulnerability that has been actively exploited in the wild, a security researcher has discovered.

jQuery File Upload is a jQuery widget “with multiple file selection, drag&drop support, progress bars, validation and preview images, audio and video.” The plugin works with a broad range of server-side platforms that support standard HTML form file uploads: PHP, Python, Ruby on Rails, Java, Node.js, Go, and others.

While analyzing the package’s source, Cashdollar discovered two PHP files named upload.php and UploadHandler.php, which contained the file upload code. Files were saved to the files/ directory in the web server's root path, and the researcher was able to leverage this to upload a web shell and run commands on the server.
“A browser connection to the test web server with cmd=id returned the user id of the web server's running process,” the researcher notes.

Source: https://www.securityweek.com/0-day-jquer...plications
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 13:23
QOwnNotes
26.3.14  Remember...Kool — 13:19
Opera 129
Dear Opera Users! ...harlan4096 — 11:05
Vivaldi 7.9 Build 3970.39
Vivaldi 7.9 Build ...harlan4096 — 11:04
Google Chrome 146.0.7680.153/154
Google Chrome 146....harlan4096 — 11:03

[-]
Birthdays
Today's Birthdays
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (38)Charlesfibre
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>