nuclei-templates/vulnerabilities/other/ueditor-file-upload.yaml

26 lines
749 B
YAML

id: ueditor-file-upload
info:
name: UEditor Arbitrary File Upload
author: princechaddha
severity: high
description: A vulnerability in UEditor allows remote unauthenticated attackers to upload arbitrary files to the server, this in turn can be used to make the application to execute their content as code.
reference:
- https://zhuanlan.zhihu.com/p/85265552
- https://www.freebuf.com/vuls/181814.html
tags: ueditor,fileupload
requests:
- method: GET
path:
- "{{BaseURL}}/ueditor/net/controller.ashx?action=catchimage&encode=utf-8"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "没有指定抓取源"
part: body