-
Notifications
You must be signed in to change notification settings - Fork 33
/
Copy pathAmcrest-IP-Camera-Information-Disclosure-(CVE-2017-8229).json
108 lines (108 loc) · 3.04 KB
/
Amcrest-IP-Camera-Information-Disclosure-(CVE-2017-8229).json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
{
"Name": "Amcrest IP Camera Information Disclosure (CVE-2017-8229)",
"Description": "<p>The Amcrest IP Camera is a wireless IP camera from Amcrest that allows unauthenticated attackers to download administrative credentials.<p>The attacker could exploit this vulnerability to download administrative credentials.</p></p>",
"Product": "Amcrest IP Camera",
"Homepage": "https://amcrest.com/",
"DisclosureDate": "2022-03-01",
"Author": "AnMing",
"FofaQuery": "app=\"AMCREST-camera\"",
"GobyQuery": "app=\"AMCREST-camera\"",
"Level": "1",
"Impact": "<p>The attacker could exploit this vulnerability to download administrative credentials.</p>",
"Recommendation": "The supplier has released a solution, please upgrade to the new version:https://amcrest.com/",
"References": [
"https://poc.shuziguanxing.com/#/publicIssueInfo#issueId=5471",
"https://www.cnvd.org.cn/flaw/show/CNVD-2019-24194"
],
"Translation": {
"CN": {
"Name": "Amcrest IP Camera 无线IP摄像头信息泄露漏洞(CVE-2017-8229)",
"Product": "Amcrest IP Camera",
"VulType": [
"信息泄露"
],
"Tags": [
"信息泄露"
],
"Description": "<p>Amcrest IP Camera是Amcrest公司的一款无线IP摄像头,设备允许未经身份验证的攻击者下载管理凭据。</p><p>Amcrest IP Camera 存在信息泄露漏洞,攻击者可利用该漏洞下载管理凭证。</p>",
"Impact": "<p>Amcrest IP Camera 存在信息泄露漏洞,攻击者可利用该漏洞下载管理凭证。</p>",
"Recommendation": "<p>厂商已提供漏洞修补方案,请关注厂商主页及时更新:<a href=\"https://amcrest.com/\">https://amcrest.com/</a></p>"
}
},
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "username",
"type": "select",
"value": "admin",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "POST",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": [
"username|lastbody|regex|admin"
]
}
],
"ExploitSteps": [
""
],
"Tags": [
"information-disclosure"
],
"VulType": [
"information-disclosure"
],
"CVEIDs": [
"CVE-2017-8229"
],
"CNNVD": [
"CNNVD-201907-200"
],
"CNVD": [
"CNVD-2019-24194"
],
"CVSSScore": "5.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}