mirror of https://github.com/qwqdanchun/Goby.git
108 lines
3.0 KiB
JSON
108 lines
3.0 KiB
JSON
|
{
|
|||
|
"Name": "Amcrest IP Camera Information Disclosure (CVE-2017-8229)",
|
|||
|
"Description": "<p>The Amcrest IP Camera is a wireless IP camera from Amcrest that allows unauthenticated attackers to download administrative credentials.<p>The attacker could exploit this vulnerability to download administrative credentials.</p></p>",
|
|||
|
"Product": "Amcrest IP Camera",
|
|||
|
"Homepage": "https://amcrest.com/",
|
|||
|
"DisclosureDate": "2022-03-01",
|
|||
|
"Author": "AnMing",
|
|||
|
"FofaQuery": "app=\"AMCREST-camera\"",
|
|||
|
"GobyQuery": "app=\"AMCREST-camera\"",
|
|||
|
"Level": "1",
|
|||
|
"Impact": "<p>The attacker could exploit this vulnerability to download administrative credentials.</p>",
|
|||
|
"Recommendation": "The supplier has released a solution, please upgrade to the new version:https://amcrest.com/",
|
|||
|
"References": [
|
|||
|
"https://poc.shuziguanxing.com/#/publicIssueInfo#issueId=5471",
|
|||
|
"https://www.cnvd.org.cn/flaw/show/CNVD-2019-24194"
|
|||
|
],
|
|||
|
"Translation": {
|
|||
|
"CN": {
|
|||
|
"Name": "Amcrest IP Camera 无线IP摄像头信息泄露漏洞(CVE-2017-8229)",
|
|||
|
"Product": "Amcrest IP Camera",
|
|||
|
"VulType": [
|
|||
|
"信息泄露"
|
|||
|
],
|
|||
|
"Tags": [
|
|||
|
"信息泄露"
|
|||
|
],
|
|||
|
"Description": "<p>Amcrest IP Camera是Amcrest公司的一款无线IP摄像头,设备允许未经身份验证的攻击者下载管理凭据。</p><p>Amcrest IP Camera 存在信息泄露漏洞,攻击者可利用该漏洞下载管理凭证。</p>",
|
|||
|
"Impact": "<p>Amcrest IP Camera 存在信息泄露漏洞,攻击者可利用该漏洞下载管理凭证。</p>",
|
|||
|
"Recommendation": "<p>厂商已提供漏洞修补方案,请关注厂商主页及时更新:<a href=\"https://amcrest.com/\">https://amcrest.com/</a></p>"
|
|||
|
}
|
|||
|
},
|
|||
|
"Is0day": false,
|
|||
|
"HasExp": true,
|
|||
|
"ExpParams": [
|
|||
|
{
|
|||
|
"name": "username",
|
|||
|
"type": "select",
|
|||
|
"value": "admin",
|
|||
|
"show": ""
|
|||
|
}
|
|||
|
],
|
|||
|
"ExpTips": {
|
|||
|
"Type": "",
|
|||
|
"Content": ""
|
|||
|
},
|
|||
|
"ScanSteps": [
|
|||
|
"AND",
|
|||
|
{
|
|||
|
"Request": {
|
|||
|
"method": "POST",
|
|||
|
"uri": "/test.php",
|
|||
|
"follow_redirect": true,
|
|||
|
"header": {},
|
|||
|
"data_type": "text",
|
|||
|
"data": ""
|
|||
|
},
|
|||
|
"ResponseTest": {
|
|||
|
"type": "group",
|
|||
|
"operation": "AND",
|
|||
|
"checks": [
|
|||
|
{
|
|||
|
"type": "item",
|
|||
|
"variable": "$code",
|
|||
|
"operation": "==",
|
|||
|
"value": "200",
|
|||
|
"bz": ""
|
|||
|
},
|
|||
|
{
|
|||
|
"type": "item",
|
|||
|
"variable": "$body",
|
|||
|
"operation": "contains",
|
|||
|
"value": "test",
|
|||
|
"bz": ""
|
|||
|
}
|
|||
|
]
|
|||
|
},
|
|||
|
"SetVariable": [
|
|||
|
"username|lastbody|regex|admin"
|
|||
|
]
|
|||
|
}
|
|||
|
],
|
|||
|
"ExploitSteps": [
|
|||
|
""
|
|||
|
],
|
|||
|
"Tags": [
|
|||
|
"information-disclosure"
|
|||
|
],
|
|||
|
"VulType": [
|
|||
|
"information-disclosure"
|
|||
|
],
|
|||
|
"CVEIDs": [
|
|||
|
"CVE-2017-8229"
|
|||
|
],
|
|||
|
"CNNVD": [
|
|||
|
"CNNVD-201907-200"
|
|||
|
],
|
|||
|
"CNVD": [
|
|||
|
"CNVD-2019-24194"
|
|||
|
],
|
|||
|
"CVSSScore": "5.0",
|
|||
|
"AttackSurfaces": {
|
|||
|
"Application": null,
|
|||
|
"Support": null,
|
|||
|
"Service": null,
|
|||
|
"System": null,
|
|||
|
"Hardware": null
|
|||
|
}
|
|||
|
}
|