POC详情: 184e563866a4a8d3669f970349364b5a728cb9ad

来源
关联漏洞
标题: iSpyConnect.com Agent DVR 安全漏洞 (CVE-2024-22515)
描述:iSpyConnect.com Agent DVR是一套跨平台的视频监控软件。 iSpyConnect.com Agent DVR 5.1.6.0版本存在安全漏洞。攻击者利用该漏洞通过上传音频组件上传任意文件。
介绍
# CVE-2024-22515: File Upload Vulnerability in Agent DVR

## Information

### Description
In iSpyConnect.com Agent DVR 5.1.6.0, there is a lack of verification of file type for sound file uploads. This allows an authenticated user to upload any file type through the upload audio component simply by toggling to all files in the file open dialog.

### Additional Information
This vulnerability may be chained with my previously submitted exploit, allowing both arbitrary file upload, and arbitrary file execution.

### Affected Versions
- **Versions Affected:** 5.1.6.0 (Note: Other versions may also be impacted)

### Fixed Version
- **Version Fixed:** 5.1.7.0

### Researcher
- **Researcher:** Dylan W. Como

### Disclosure
- **Disclosure Link:** [GitHub Repository](https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution)

### References
- **NIST CVE Link:** [NVD - CVE-2024-22515](https://nvd.nist.gov/vuln/detail/CVE-2024-22515)

## Proof-of-Concept Exploit
For those interested in understanding the technical details or replicating the security findings under controlled conditions, the proof-of-concept exploit is available at the following link:

- [GitHub PoC Repository](https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution)
文件快照

[4.0K] /data/pocs/184e563866a4a8d3669f970349364b5a728cb9ad └── [1.3K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。