Company
Date Published
Author
Detectify
Word count
1042
Language
-
Hacker News points
None

Summary

The jQuery-File-Upload, a popular JavaScript repository on GitHub, has been found to contain three significant vulnerabilities, two of which allow remote code execution and one that enables unauthorized file deletion. These vulnerabilities, analyzed by Detectify Crowdsource, include CVE-2018-9206, which involves unauthenticated arbitrary file upload due to improper server configuration and reliance on Apache's .htaccess. This issue was exacerbated by Apache's discontinuation of default .htaccess support from version 2.3.9 onwards. Another vulnerability involves the use of ImageMagick, enabling remote code execution through GhostScript, also known as ImageTragick (CVE-2016-3714). The third vulnerability, considered an insecure direct object reference, allows unauthorized access and deletion of uploaded files, which poses privacy risks on platforms using jQuery-File-Upload. The first two vulnerabilities have been patched in the latest version, and users are advised to update their software and restrict access to sensitive endpoints to mitigate the third vulnerability.