Rapid7 Vulnerability & Exploit Database

blueimp's jQuery (Arbitrary) File Upload

Back to Search

blueimp's jQuery (Arbitrary) File Upload



This module exploits an arbitrary file upload in the sample PHP upload handler for blueimp's jQuery File Upload widget in versions <= 9.22.0. Due to a default configuration in Apache 2.3.9+, the widget's .htaccess file may be disabled, enabling exploitation of this vulnerability. This vulnerability has been exploited in the wild since at least 2015 and was publicly disclosed to the vendor in 2018. It has been present since the .htaccess change in Apache 2.3.9. This module provides a generic exploit against the jQuery widget.


  • Claudio Viviani
  • Larry W. Cashdollar
  • wvu <wvu@metasploit.com>




php, x86, x64


Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/unix/webapp/jquery_file_upload
msf exploit(jquery_file_upload) > show targets
msf exploit(jquery_file_upload) > set TARGET < target-id >
msf exploit(jquery_file_upload) > show options
    ...show and set options...
msf exploit(jquery_file_upload) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security