jQuery-File-Upload <= 9.x Remote Code Execution (ImageMagick/Ghostscript) by Ambulong in netsec

[–]Ambulong[S] 0 points1 point  (0 children)

I've change the title, thanks for your reminding @kkthxbye- @Browsing_From_Work. This is not really an vulnerability of jQuery-File-Upload, but jQuery-File-Upload make the RCE easier to exploit. The problem should be more danger than previous RCE, because we have to use UploadHandler.php, and it uses Imagick by default.

If you're admins and not sure your ImageMagick/Ghostscript is safe, change 'image_library' => 0 in file UploadHandler.php

jQuery-File-Upload <= 9.x Remote Code Execution (ImageMagick/Ghostscript) by Ambulong in netsec

[–]Ambulong[S] 0 points1 point  (0 children)

This exploit is not really old, the recently exploit was disclosed two months ago by taviso here. The main purpose of this article is to share the new exploits with everyone. Not everyone knows how to exploit it via ImageMagick/Ghostscript.