Goby/json/Amcrest-IP-Camera-Informati...

108 lines
3.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Amcrest IP Camera Information Disclosure (CVE-2017-8229)",
"Description": "<p>The Amcrest IP Camera is a wireless IP camera from Amcrest that allows unauthenticated attackers to download administrative credentials.<p>The attacker could exploit this vulnerability to download administrative credentials.</p></p>",
"Product": "Amcrest IP Camera",
"Homepage": "https://amcrest.com/",
"DisclosureDate": "2022-03-01",
"Author": "AnMing",
"FofaQuery": "app=\"AMCREST-camera\"",
"GobyQuery": "app=\"AMCREST-camera\"",
"Level": "1",
"Impact": "<p>The attacker could exploit this vulnerability to download administrative credentials.</p>",
"Recommendation": "The supplier has released a solution, please upgrade to the new version:https://amcrest.com/",
"References": [
"https://poc.shuziguanxing.com/#/publicIssueInfo#issueId=5471",
"https://www.cnvd.org.cn/flaw/show/CNVD-2019-24194"
],
"Translation": {
"CN": {
"Name": "Amcrest IP Camera 无线IP摄像头信息泄露漏洞CVE-2017-8229",
"Product": "Amcrest IP Camera",
"VulType": [
"信息泄露"
],
"Tags": [
"信息泄露"
],
"Description": "<p>Amcrest IP Camera是Amcrest公司的一款无线IP摄像头设备允许未经身份验证的攻击者下载管理凭据。</p><p>Amcrest IP Camera 存在信息泄露漏洞,攻击者可利用该漏洞下载管理凭证。</p>",
"Impact": "<p>Amcrest IP Camera 存在信息泄露漏洞,攻击者可利用该漏洞下载管理凭证。</p>",
"Recommendation": "<p>厂商已提供漏洞修补方案,请关注厂商主页及时更新:<a href=\"https://amcrest.com/\">https://amcrest.com/</a></p>"
}
},
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "username",
"type": "select",
"value": "admin",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "POST",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": [
"username|lastbody|regex|admin"
]
}
],
"ExploitSteps": [
""
],
"Tags": [
"information-disclosure"
],
"VulType": [
"information-disclosure"
],
"CVEIDs": [
"CVE-2017-8229"
],
"CNNVD": [
"CNNVD-201907-200"
],
"CNVD": [
"CNVD-2019-24194"
],
"CVSSScore": "5.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}