Cross Site Request Forgery (CSRF) in the bolt/upload File Upload feature in Bolt CMS 3.6.6 allows remote attackers to execute arbitrary code by uploading a JavaScript file to include executable extensions in the file/edit/config/config.yml configuration file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152429/Bolt-CMS-3.6.6-Cross-Site-Request-Forgery-Code-Execution.html | |
https://fgsec.net/from-csrf-to-rce-bolt-cms/ | Exploit Third Party Advisory |
https://github.com/bolt/bolt/pull/7768/commits/91187aef36363a870d60b0a3c1bf8507af34c9e4 | Exploit Patch Third Party Advisory |
https://www.exploit-db.com/exploits/46664/ | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-04-05T04:42:32
Updated: 2019-04-08T19:06:04
Reserved: 2019-04-04T00:00:00
Link: CVE-2019-10874
JSON object: View
NVD Information
Status : Modified
Published: 2019-04-05T05:29:03.140
Modified: 2021-01-04T18:02:39.820
Link: CVE-2019-10874
JSON object: View
Redhat Information
No data.
CWE