cve/2019/CVE-2019-6714.md

25 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-6714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6714)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in BlogEngine.NET through 3.3.6.0. A path traversal and Local File Inclusion vulnerability in PostList.ascx.cs can cause unauthenticated users to load a PostView.ascx component from a potentially untrusted location on the local filesystem. This is especially dangerous if an authenticated user uploads a PostView.ascx file using the file manager utility, which is currently allowed. This results in remote code execution for an authenticated user.
### POC
#### Reference
- http://packetstormsecurity.com/files/151628/BlogEngine.NET-3.3.6-Directory-Traversal-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/46353/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AfvanMoopen/tryhackme-
- https://github.com/Hobo-Hilly/HackPark-THM
- https://github.com/Mithlonde/Mithlonde
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/dayaramb/dayaramb.github.io
- https://github.com/testermas/tryhackme