Vulnerabilities
Vulnerable Software
Bludit:  >> Bludit  Security Vulnerabilities
ajax/profile-picture-upload.php in Bludit 3.10.0 allows authenticated users to change other users' profile pictures.
CVSS Score
4.3
EPSS Score
0.004
Published
2020-02-07
Bludit 3.10.0 allows Editor or Author roles to insert malicious JavaScript on the WYSIWYG editor. NOTE: the vendor's perspective is that this is "not a bug.
CVSS Score
5.4
EPSS Score
0.003
Published
2020-02-07
bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
CVSS Score
3.7
EPSS Score
0.746
Published
2019-10-06
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
CVSS Score
4.8
EPSS Score
0.002
Published
2019-09-15
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
CVSS Score
8.8
EPSS Score
0.903
Published
2019-09-08
Bludit prior to 3.9.1 allows a non-privileged user to change the password of any account, including admin. This occurs because of bl-kernel/admin/controllers/user-password.php Insecure Direct Object Reference (a modified username POST parameter).
CVSS Score
8.8
EPSS Score
0.003
Published
2019-06-05
Bludit before 3.9.0 allows remote code execution for an authenticated user by uploading a php file while changing the logo through /admin/ajax/upload-logo.
CVSS Score
8.8
EPSS Score
0.024
Published
2019-06-03
bludit version 3.0.0 contains a Unrestricted Upload of File with Dangerous Type vulnerability in Content Upload in Pages Editor that can result in Remote Command Execution. This attack appear to be exploitable via malicious user have to upload a crafted payload containing PHP code.
CVSS Score
8.8
EPSS Score
0.231
Published
2018-12-20
Bludit 2.3.4 allows XSS via a user name.
CVSS Score
6.1
EPSS Score
0.002
Published
2018-09-01
In Bludit v1.5.2 and v2.0.1, an XSS vulnerability is located in the new page, new category, and edit post function body message context. Remote attackers are able to bypass the basic editor validation to trigger cross site scripting. The XSS is persistent and the request method to inject via editor is GET. To save the editor context, the followup POST method request must be processed to perform the attack via the application side. The basic validation of the editor does not allow injecting script codes and blocks the context. Attackers can inject the code by using an editor tag that is not recognized by the basic validation. Thus allows a restricted user account to inject malicious script code to perform a persistent attack against higher privilege web-application user accounts.
CVSS Score
5.4
EPSS Score
0.003
Published
2017-11-06


Contact Us

Shodan ® - All rights reserved