Cross Site Request Forgery (CSRF) in the bolt/upload File Upload feature in Bolt CMS 3.6.6 allows remote attackers to execute arbitrary code by uploading a JavaScript file to include executable extensions in the file/edit/config/config.yml configuration file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152429/Bolt-CMS-3.6.6-Cross-Site-Request-Forgery-Code-Execution.html | |
https://fgsec.net/from-csrf-to-rce-bolt-cms/ | Exploit Third Party Advisory |
https://github.com/bolt/bolt/pull/7768/commits/91187aef36363a870d60b0a3c1bf8507af34c9e4 | Exploit Patch Third Party Advisory |
https://www.exploit-db.com/exploits/46664/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2019-04-05 05:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-10874
Mitre link : CVE-2019-10874
CVE.ORG link : CVE-2019-10874
JSON object : View
Products Affected
boltcms
- bolt
CWE
CWE-352
Cross-Site Request Forgery (CSRF)