The vulnerability is publicly known since at least 2015.
Vulnerability details
Advisory: SB2018101901 - Arbitrary file upload in jQuery File Upload plugin
Vulnerable component: jQuery File Upload
CVE-ID: CVE-2018-9206
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type
Description:
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists in the plugin's source code that handles file uploads to PHP servers due to software allows upload of arbitrary files to the system. A remote unauthenticated attacker can upload arbitrary .htaccess file to impose security restrictions to its upload folder and upload backdoors and web shells.
Public Exploits:
- blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit) [Exploit-DB]
- jQuery-File-Upload 9.22.0 - Arbitrary File Upload [Exploit-DB]
- Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit [Exploit-DB]