mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
25 lines
1.3 KiB
Markdown
25 lines
1.3 KiB
Markdown
![]() |
### [CVE-2019-6714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6714)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An issue was discovered in BlogEngine.NET through 3.3.6.0. A path traversal and Local File Inclusion vulnerability in PostList.ascx.cs can cause unauthenticated users to load a PostView.ascx component from a potentially untrusted location on the local filesystem. This is especially dangerous if an authenticated user uploads a PostView.ascx file using the file manager utility, which is currently allowed. This results in remote code execution for an authenticated user.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/151628/BlogEngine.NET-3.3.6-Directory-Traversal-Remote-Code-Execution.html
|
||
|
- https://www.exploit-db.com/exploits/46353/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/AfvanMoopen/tryhackme-
|
||
|
- https://github.com/Hobo-Hilly/HackPark-THM
|
||
|
- https://github.com/Mithlonde/Mithlonde
|
||
|
- https://github.com/alphaSeclab/sec-daily-2019
|
||
|
- https://github.com/dayaramb/dayaramb.github.io
|
||
|
- https://github.com/testermas/tryhackme
|
||
|
|