vendor:
GR Blog
by:
Jose Luis Gongora Fernandez
7.5
CVSS
HIGH
Multiple Remote Vulnerabilities
N/A
CWE
Product Name: GR Blog
Affected Version From: GR Blog v1.1.4
Affected Version To: GR Blog v1.1.4
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
GR Blog v1.1.4 (Upload/Bypass) Multiple Remote Vulnerabilities
GR Blog v1.1.4 is vulnerable to multiple remote vulnerabilities, including remote file upload, simple bypass, GET bypass, and POST bypass. The remote file upload vulnerability allows an attacker to upload a malicious file with a .php.jpg extension, which can be used to execute arbitrary code on the server. The simple bypass vulnerability allows an attacker to bypass authentication and access restricted files. The GET bypass vulnerability allows an attacker to access restricted files by manipulating the 'uid' parameter. The POST bypass vulnerability allows an attacker to access restricted files by manipulating the 'postStart' and 'categoryName' parameters.
Mitigation:
Ensure that all user-supplied input is properly validated and sanitized. Ensure that all authentication and authorization checks are properly implemented. Ensure that all files are uploaded to a non-web-accessible directory.