Unrestricted Upload of File with Dangerous Type in BoltWire
|Vulnerable Versions:||4.10 and probably prior|
|Advisory Publication:||June 11, 2014 [without technical details]|
|Vendor Notification:||June 11, 2014|
|Vendor Fix:||June 19, 2014|
|Public Disclosure:||July 2, 2014|
|Latest Update:||June 19, 2014|
|Vulnerability Type:||Unrestricted Upload of File with Dangerous Type [CWE-434]|
|CVSSv2 Base Score:||10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered vulnerability in BoltWire, which can be exploited to execute arbitrary PHP code on the target system and gain complete control over vulnerable web application.
|Update to BoltWire 4.11|
| High-Tech Bridge Advisory HTB23218 - https://www.htbridge.com/advisory/HTB23218 - Unrestricted Upload of File with Dangerous Type in BoltWire.|
 BoltWire - http://www.boltwire.com/ - BoltWire is an easy to use web development engine with surprizing flexibility and power. It has the various strengths of a wiki, cms, database, search engine, and more, all rolled together into an innovative software system of ground-breaking design.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing.
 Free SSL/TLS Server test - Test SSL/TLS encryption reliability and security of your web or email server, verify compliance with PCI DSS, HIPAA and NIST.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.