Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16113 PoC — Bludit 路径遍历漏洞

Source
Associated Vulnerability
Title:Bludit 路径遍历漏洞 (CVE-2019-16113)
Description:Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
Description
Bludit Exploitation Via upload Image.php 
File Snapshot

[4.0K] /data/pocs/22f9b7d88c2a0289739233b8c2f773c743bfd646 ├── [1.4K] bludit_password.py ├── [ 950] bludit.sh └── [4.0K] Hack The Box Blunder Exploit ├── [ 170] commands.rc ├── [ 281] foothold.sh ├── [ 470] Guide to Use ├── [ 500] README.md └── [ 143] root.sh 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →