Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/gather/ipcamera_password_disclosure.md
Views: 11784
Description
SIEMENS IP-Camera (CVMS2025-IR + CCMS2025), JVC IP-Camera (VN-T216VPRU), and Vanderbilt IP-Camera (CCPW3025-IR + CVMW3025-IR) allow an unauthenticated user to disclose the username & password by requesting the javascript page 'readfile.cgi?query=ADMINID'. Siemens firmwares affected: x.2.2.1798, CxMS2025_V2458_SP1, x.2.2.1798, x.2.2.1235
Vulnerable Application
This module has been verified against the mock vulnerable page listed below.
Mock Vulnerable Page
These instructions will create a cgi environment and a vulnerable perl application for exploitation. Kali rolling (2019.1) was utilized for this tutorial, with apache.
Setup
Enable cgi:
a2enmod cgid
mkdir /var/www/html/cgi-bin
Enable folder for cgi execution: add
ScriptAlias "/cgi-bin/" "/var/www/html/cgi-bin/"
to/etc/apache2/sites-enabled/000-default.conf
inside of theVirtualHost
tagsCreate the vulnerable page by writing the following text to
/var/www/html/cgi-bin/readfile.cgi
:
Verification Steps
Start msfconsole
use auxiliary/gather/ipcamera_password_disclosure
set rhosts [rhosts]
run