32 lines
1021 B
YAML
32 lines
1021 B
YAML
|
id: ueditor-file-upload
|
||
|
|
||
|
info:
|
||
|
name: UEditor - Arbitrary File Upload
|
||
|
author: princechaddha
|
||
|
severity: high
|
||
|
description: UEditor contains an arbitrary file upload vulnerability. An attacker can upload arbitrary files to the server, which in turn can be used to make the application execute file content as code, As a result, an attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
|
||
|
reference:
|
||
|
- https://zhuanlan.zhihu.com/p/85265552
|
||
|
- https://www.freebuf.com/vuls/181814.html
|
||
|
classification:
|
||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||
|
cvss-score: 8.8
|
||
|
cwe-id: CWE-434
|
||
|
tags: ueditor,fileupload
|
||
|
|
||
|
http:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- "{{BaseURL}}/ueditor/net/controller.ashx?action=catchimage&encode=utf-8"
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|
||
|
- type: word
|
||
|
words:
|
||
|
- "没有指定抓取源"
|
||
|
part: body
|
||
|
|
||
|
# Enhanced by md on 2022/10/31
|