Search

Blueimp’s jQuery 9.22.0 – (Arbitrary) File Upload (Metasploit)

As the Metasploit discloses the new blueimp’s jQuery 9.22.0 RCE vulnerability which allows attackers to remotely execute code on the server which runs blueimp’s jQuery to get reverse meterpreter shell in return. This leads to the major issue and can give complete access to the server to the attacker.

 The blueimp’s jQuery is a  File Upload with multiple file selection, It works with any server-side platform like Google search Engine, PHP, Python, Ruby, and Java, etc. It supports standard HTML form file uploads. It also Supports Drags&Drop, audio, videos cross-domain, chunked and resumable file uploads. progress bar, validation and preview images, for jQuery.

Workflow

       I just set up the blueimp’s jQuery on the xampp server. We added the ruby exploit module in the Metasploit framework downloaded from the exploit-db.com. The exploit sends the malicious codes to the blueimp’s jQuery which sends the reverse connection to our Metasploit listener which allows us to get the meterpreter shell.

 POC      I just set up the blueimp’s jQuery on the xampp server.

2ZLkSHVqDnumovAkSKjXoXyCvRlMvYlQmch0RsBd7LTLN4JkypMTMpO7V5Kz HDFFFrZCw5vE6gMLT7Om6ZYf9SAVeMnsEgmtvu9rYgTOT5PC2ikMwp7 X29qTi9LwqSiWUSldsa

Then I open the msfconsole.

j1OJUe5Df6RfowkliHKc64T83RIyOwyCqz2JNH2l16 ppbI8lcwarmrM

And I search exploit 45790 in the Metasploit. 45790 is a exploit code of Blueimp’s jQuery.

ZiaxHE7OaGfg749jc

I set all the required options ( RHOSTS & TARGETURI) and hit enter after a few seconds I got Meterpreter shell.

Aq 0S1NdrUTTPUJ5 QTgG8X8czCOPh L5j9WfZWq792oTCHEtEWRMzfg lBtvWPkGlB5K95dLo0uBB7leFWObwMTiQ1cW9WBv8Zvs7dKHUKnfhuq2QV4qE3pbOy50TW PgGPHtcM
QS9V4fML YI4FCigOYGqO5XswI3 nCHZ

Reference :- https://www.exploit-db.com/exploits/45790


Book A Free Demo Class

    Social Media
    Facebook
    Twitter
    WhatsApp
    LinkedIn