Hikvision iVMS Unrestricted File Upload Scanner
Detects 'Unrestricted File Upload' vulnerability in Hikvision iVMS.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
23 days 21 hours
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Hikvision iVMS is a widely utilized integrated security system employed by various organizations for video surveillance and management. It is used extensively in security applications, such as in public spaces, enterprises, and city surveillance systems, enabling users to monitor and record security footage across multiple cameras. The software is designed to provide a comprehensive security solution, integrating video analytics, alarm monitoring, and data storage functions. Users benefit from its ability to configure and manage numerous security devices via a unified platform. As a trusted security management tool, ensuring its integrity is crucial to maintaining the safety of the monitored environment.
The unrestricted file upload vulnerability found in Hikvision iVMS allows unauthorized users to upload files without proper restrictions or authentication. This vulnerability can be exploited by attackers to upload malicious files, including webshells, onto the server running the iVMS software. By utilizing this vulnerability, attackers can bypass security controls intended to prevent unauthorized file uploads, gaining access to sensitive systems. The ease with which this vulnerability can be exploited makes it a critical concern for system administrators. Properly mitigating this vulnerability is essential to prevent unauthorized access and potential compromise of the security system.
The technical details of the unrestricted file upload vulnerability involve the misuse of the "/resourceOperations/upload" endpoint within the Hikvision iVMS system. Attackers exploit the vulnerability by obtaining an encryption key and generating a forged token, allowing them to interact with the vulnerable endpoint. They can craft HTTP requests that appear legitimate, thereby successfully uploading arbitrary files to the server. The vulnerability resides in the insufficient validation of input data and the lack of proper authentication checks before allowing file operations. This oversight permits attackers to execute their payloads, leading to further exploitation possibilities.
If exploited, this vulnerability has severe potential repercussions, including unauthorized remote control and execution of code on the affected server. Attackers can deploy malware or maintain persistent access through uploaded webshells, compromising the entire security system. Moreover, the vulnerability might facilitate information disclosure, data manipulation, or disruption of services. Such exploitation can affect the trust and reliability of the security infrastructure, leading to significant operational and reputational damage. Immediate attention is crucial to mitigate these risks and protect sensitive environments monitored by Hikvision iVMS.
REFERENCES