JustboilME Plugins Image Upload Vulnerability

漏洞信息

漏洞名称: Justboil.ME Plugins Image Upload Vulnerability

漏洞类型: 文件上传

漏洞等级: 中危

漏洞描述: Justboil.ME插件是一个用于TinyMCE编辑器的图像上传插件,广泛应用于网站内容管理系统中,允许用户通过TinyMCE编辑器上传和管理图像。该插件在特定版本中存在文件上传漏洞,攻击者可以利用此漏洞上传恶意文件到服务器。漏洞的技术根源在于插件未能正确验证上传文件的类型和内容,导致攻击者可以绕过安全限制上传任意文件。这种漏洞可能导致服务器被植入恶意脚本,进而引发远程代码执行、数据泄露等安全问题。由于该插件通常集成在内容管理系统中,且许多网站可能未及时更新,因此该漏洞的影响范围可能较广。攻击者无需认证即可利用此漏洞,增加了漏洞的潜在危害。

产品厂商: Justboil.ME

产品名称: Justboil.ME Plugins

来源: https://github.com/projectdiscovery/nuclei-templates/issues/12741

类型: projectdiscovery/nuclei-templates:github issues

来源概述

Is there an existing template for this?

  • I have searched the existing templates.

Nuclei Template

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
id: justboil-me-image-upload

info:
name: Justboil.ME Plugins Image Upload Vulnerability
author: 0xr2r
severity: medium
reference: https://github.com/0xr2r
description: |
This template checks for the Justboil.ME image upload vulnerability by verifying the presence of the vulnerable dialog file.
tags: justboil, image-upload, vulnerability

http:
- method: GET
path:
- "{{BaseURL}}/plugins/generic/tinymce/plugins/justboil.me/dialog-v4.htm"

matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "JustBoil.me Images Plugin"
- "TinyMCE"
- type: word
part: header
words:
- "Content-Type: text/html"

extractors:
- type: regex
part: body
regex:
- "<title>(.*?)</title>"

Relevant dumped responses

1
2


Anything else?

Image