nuclei-templates/vulnerabilities/other/ueditor-file-upload.yaml

26 lines
749 B
YAML
Raw Normal View History

2021-04-23 12:15:09 +00:00
id: ueditor-file-upload
2021-04-23 12:15:09 +00:00
info:
name: UEditor Arbitrary File Upload
author: princechaddha
severity: high
2021-10-25 09:58:22 +00:00
description: A vulnerability in UEditor allows remote unauthenticated attackers to upload arbitrary files to the server, this in turn can be used to make the application to execute their content as code.
reference:
2021-04-23 12:15:09 +00:00
- https://zhuanlan.zhihu.com/p/85265552
- https://www.freebuf.com/vuls/181814.html
tags: ueditor,fileupload
requests:
- method: GET
path:
- "{{BaseURL}}/ueditor/net/controller.ashx?action=catchimage&encode=utf-8"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "没有指定抓取源"
part: body