Bludit-auth-BF-bypass icon indicating copy to clipboard operation
Bludit-auth-BF-bypass copied to clipboard

Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass

Bludit Auth BF mitigation bypass exploit / PoC

Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass

Exploit / PoC for CVE-2019-17240.

[EDB-48746] [PacketStorm] [WLB-2020080094]

Usage

$ ruby exploit.rb --help
Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass

Usage:
  exploit.rb -r <url> -u <username> -w <path> [--debug]
  exploit.rb -H | --help

Options:
  -r <url>, --root-url <url>            Root URL (base path) including HTTP scheme, port and root folder
  -u <username>, --user <username>      Username of the admin
  -w <path>, --wordlist <path>          Path to the wordlist file
  --debug                               Display arguments
  -H, --help                            Show this screen

Examples:
  exploit.rb -r http://example.org -u admin -w myWordlist.txt
  exploit.rb -r https://example.org:8443/bludit -u john -w /usr/share/wordlists/password/rockyou.txt

Requirements

Example for BlackArch:

pacman -S ruby-httpclient ruby-docopt

Example using gem:

gem install httpclient docopt

Reference

This is an exploit for the vulnerability found by Rastating on Bludit CMS.

Vulnerability explanation: https://rastating.github.io/bludit-brute-force-mitigation-bypass/.

Patch: https://github.com/bludit/bludit/pull/1090

This exploit was tested with Ruby 2.7.1.