Skip to content

Amcrest Login

ID: amcrest-login

Severity: info

Author: DhiyaneshDK

Tags: panel,camera,amcrest,edb

An Amcrest LDAP user login was discovered.

id: amcrest-login
info:
name: Amcrest Login
author: DhiyaneshDK
severity: info
description: An Amcrest LDAP user login was discovered.
reference:
- https://www.exploit-db.com/ghdb/7273
classification:
cwe-id: CWE-200
cpe: cpe:2.3:h:amcrest:ip2m-853ew:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: amcrest
product: ip2m-853ew
shodan-query:
- html:"amcrest"
- http.html:"amcrest" "ldap user"
- http.html:"amcrest"
google-query:
- intext:"amcrest" "LDAP User"
- intext:"amcrest" "ldap user"
fofa-query:
- body="amcrest" "ldap user"
- body="amcrest"
tags: panel,camera,amcrest,edb
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
words:
- "Amcrest Technologies"
- "LDAPUser"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100992b57a05a822ccc97ad33e311cae3ae197c9ced27dae818281cc86b734f982602210089a66f908d8319b5b51eaf78f331e2503a6f424bf8c70d914b7312f0e3d20678:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/amcrest-login.yaml"

View on Github