Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-17240

EPSS 82.62% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-17240

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Bludit 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Bludit是一套开源的轻量级博客内容管理系统(CMS)。 Bludit 3.9.2版本中的bl-kernel/security.class.php文件存在安全漏洞。攻击者通过使用多个伪造的X-Forwarded-For或Client-IP HTTP标头利用该漏洞绕过保护机制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-17240

#POC DescriptionSource LinkShenlong Link
1This is the exploit of CVE-2019-17240. https://github.com/pingport80/CVE-2019-17240POC Details
2Bludit 3.9.2 - bruteforce bypass - CVE-2019-17240https://github.com/LucaReggiannini/Bludit-3-9-2-bbPOC Details
3Better version of rastating.github.io/bludit-brute-force-mitigation-bypass/https://github.com/triple-octopus/Bludit-CVE-2019-17240-ForkPOC Details
4Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass Exploit/PoChttps://github.com/ColdFusionX/CVE-2019-17240_Bludit-BF-BypassPOC Details
5Bypass bludit mitigation login form and upload malicious to call a rev shell https://github.com/jayngng/bludit-CVE-2019-17240POC Details
6Bludit 3.9.2 - Auth Brute Force Mitigation Bypass. CVE-2019-17240https://github.com/brunosergi/blooditPOC Details
7Nonehttps://github.com/spyx/cve-2019-17240POC Details
8Bludit 3.9.2 auth bruteforce bypasshttps://github.com/mind2hex/CVE-2019-17240POC Details
9Bludit 3.9.2 - Auth Bruteforce Bypass CVE:2019-17240 Refurbish In bashhttps://github.com/0xDTC/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240POC Details
10Bludit 3.9.2 auth bruteforce bypasshttps://github.com/mind2hex/CVE-2019-17240-Bludit-3.9.2-Auth-Bruteforce-BypassPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-17240

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-10-06 · 15 CVEs total

CVE-2019-17269Intellian Technologies Remote Access 操作系统命令注入漏洞
CVE-2019-17267FasterXML jackson-databind 代码问题漏洞
CVE-2019-17266libsoup 缓冲区错误漏洞
CVE-2019-17264libyal liblnk 缓冲区错误漏洞
CVE-2019-17263libyal libfwsi 缓冲区错误漏洞
CVE-2019-17226CMS Made Simple 跨站脚本漏洞
CVE-2019-17225Subrion CMS 跨站脚本漏洞
CVE-2019-17215V-Zug Combi-Steam MSLQ 授权问题漏洞
CVE-2019-17216V-Zug Combi-Steam MSLQ 授权问题漏洞
CVE-2019-17217V-Zug Combi-Steam MSLQ 跨站请求伪造漏洞
CVE-2019-17218V-Zug Combi-Steam MSLQ 安全漏洞
CVE-2019-17219V-Zug Combi-Steam MSLQ 访问控制错误漏洞
CVE-2019-17213WordPress WebARX插件跨站脚本漏洞
CVE-2019-17214WordPress WebARX插件跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2019-17240

No comments yet


Leave a comment