<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CKEditor_3_SSRF%E6%BC%8F%E6%B4%9E</id>
	<title>CKEditor 3 SSRF漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CKEditor_3_SSRF%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CKEditor_3_SSRF%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-07T08:50:51Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CKEditor_3_SSRF%E6%BC%8F%E6%B4%9E&amp;diff=5203&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: CKEditor 3 - Server-Side Request Forgery (SSRF) # Google Dorks : inurl /editor/filemanager/connectors/uploadtest.html # Date: 12-6-2021 # Exploit Author...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CKEditor_3_SSRF%E6%BC%8F%E6%B4%9E&amp;diff=5203&amp;oldid=prev"/>
		<updated>2021-06-17T00:43:39Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: CKEditor 3 - Server-Side Request Forgery (SSRF) # Google Dorks : inurl /editor/filemanager/connectors/uploadtest.html # Date: 12-6-2021 # Exploit Author...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: CKEditor 3 - Server-Side Request Forgery (SSRF)&lt;br /&gt;
# Google Dorks : inurl /editor/filemanager/connectors/uploadtest.html&lt;br /&gt;
# Date: 12-6-2021&lt;br /&gt;
# Exploit Author: Blackangel&lt;br /&gt;
# Software Link: https://ckeditor.com/&lt;br /&gt;
# Version:all version under 4 (1,2,3)&lt;br /&gt;
# Tested on: windows 7&lt;br /&gt;
&lt;br /&gt;
Steps of Exploit:-&lt;br /&gt;
&lt;br /&gt;
1-using google dorks&lt;br /&gt;
&lt;br /&gt;
inurl /editor/filemanager/connectors/uploadtest.html&lt;br /&gt;
&lt;br /&gt;
2-after going to vulnerable page you will find filed “Custom Uploader URL: ”&lt;br /&gt;
&lt;br /&gt;
3-right click then choose inspect element, click on pick an element from&lt;br /&gt;
the page , select field Custom Uploader URL:&lt;br /&gt;
&lt;br /&gt;
4-in elements “&amp;lt;input id=”txtCustomUrl” style=”WIDTH: 100%;&lt;br /&gt;
BACKGROUND-COLOR: #dcdcdc” disabled=”” type=”text”&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
delete disabled=””&lt;br /&gt;
&lt;br /&gt;
5-now you can put url start with any protocal&lt;br /&gt;
&lt;br /&gt;
6-send it to the server as you see website that you have entered link&lt;br /&gt;
&lt;br /&gt;
is appear into page .&lt;br /&gt;
&lt;br /&gt;
what this mean??!!1&lt;br /&gt;
&lt;br /&gt;
you send request to server using vulnerable website&lt;br /&gt;
&lt;br /&gt;
you can said i used it as proxy&lt;br /&gt;
&lt;br /&gt;
hackers &amp;gt;&amp;gt;&amp;gt; vulnerable website &amp;gt;&amp;gt;&amp;gt; http:/xx.com&lt;br /&gt;
&lt;br /&gt;
so in http://xx.com logs requests come from vulnerable website&lt;br /&gt;
&lt;br /&gt;
impact:-&lt;br /&gt;
&lt;br /&gt;
1-that allows an attacker to induce the server-side application to make&lt;br /&gt;
HTTP requests to an arbitrary domain of the attacker’s choosing. if there&lt;br /&gt;
is big company use old version hackers can send request via there websites&lt;br /&gt;
and this not good for reputation of company&lt;br /&gt;
&lt;br /&gt;
2-put big company website in blacklist of websites cause i hackers can send&lt;br /&gt;
many of request via vulnerable website&lt;br /&gt;
&lt;br /&gt;
Mitigation:-&lt;br /&gt;
&lt;br /&gt;
Remove the uploadtest.html file as it is not used by the application.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>