Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

UEditor - Arbitrary File Upload

By kannthu

High
Vidoc logoVidoc Module
#ueditor#fileupload
Description

UEditor - Arbitrary File Upload

This module is designed to detect an arbitrary file upload vulnerability in UEditor, a software used for online text editing. The severity of this vulnerability is classified as high. This module was authored by princechaddha.

Impact

An attack exploiting this vulnerability could allow an attacker to upload arbitrary files to the UEditor application, potentially leading to remote code execution or unauthorized access to sensitive information.

How the module works?

This module sends a GET request to the UEditor controller endpoint /ueditor/net/controller.ashx?action=catchimage&encode=utf-8. It then applies two matching conditions to determine if the vulnerability is present:

    - The response status code must be 200. - The response body must contain the phrase "没有指定抓取源" (which translates to "No specified capture source" in English).

If both conditions are met, the module reports a vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/ueditor/net/control...
Matching conditions
status: 200and
word: 没有指定抓取源
Passive global matcher
No matching conditions.
On match action
Report vulnerability