This advisory details two vulnerabilities in aradBlog <= 1.2.8: an authentication bypass via a virtual path ('mainadmin') and an arbitrary file upload vulnerability in the downloads.aspx page. The writeup includes technical details such as affected code paths and PoC URLs.
Classification
Writeup 90%
Attack Type
Auth Bypass | Other
Complexity
Trivial
Reliability
Reliable
Target:aradBlog <= 1.2.8
No auth needed
Prerequisites:Access to the target web application