CVE-2019-16113

HIGH

Bludit 3.9.2 - RCE

Title source: llm

Description

Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.

Exploits (14)

nomisec WORKING POC 13 stars
by cybervaca · poc
https://github.com/cybervaca/CVE-2019-16113
nomisec WORKING POC 5 stars
by ynots0ups · poc
https://github.com/ynots0ups/CVE-2019-16113
nomisec WORKING POC 5 stars
by hg8 · poc
https://github.com/hg8/CVE-2019-16113-PoC
nomisec WORKING POC 1 stars
by mind2hex · poc
https://github.com/mind2hex/CVE-2019-16113-Bludit-3.9.2-RCE
nomisec WORKING POC
by DXY0411 · poc
https://github.com/DXY0411/CVE-2019-16113
nomisec WORKING POC
by m4rm0k · poc
https://github.com/m4rm0k/CVE-2019-16113
nomisec WORKING POC
by Kenun99 · poc
https://github.com/Kenun99/CVE-2019-16113-Dockerfile
gitlab WORKING POC
by s0ups · poc
https://gitlab.com/s0ups/cve-2019-16113
nomisec WORKING POC
by dldygnl · poc
https://github.com/dldygnl/CVE-2019-16113
metasploit WORKING POC EXCELLENT
by christasa, sinn3r · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/bludit_upload_images_exec.rb
exploitdb WORKING POC
by Luis Vacacas · pythonwebappsphp
https://www.exploit-db.com/exploits/48568
exploitdb WORKING POC
by James Green · textwebappsmultiple
https://www.exploit-db.com/exploits/48701
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/47699

Scores

CVSS v3 8.8
EPSS 0.8975
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-22
Status published

Affected Products (1)

bludit/bludit

Timeline

Published Sep 08, 2019
Tracked Since Feb 18, 2026