CNVD-2019-00363

Vulnerability from cnvd - Published: 2019-01-04
VLAI Severity ?
Title
VIVOTEK Network Camera系列产品跨站脚本漏洞
Description
VIVOTEK Network Camera Series是中国晶睿通讯(VIVOTEK)公司的一系列网络摄像机产品。 使用0x06x版本至0x08x版本固件的VIVOTEK Network Camera系列产品中的syslog.html文件存在跨站脚本漏洞,远程攻击者可借助HTTP Referer Header利用该漏洞执行任意JavaScript代码。
Severity
Patch Name
VIVOTEK Network Camera系列产品跨站脚本漏洞的补丁
Patch Description
VIVOTEK Network Camera Series是中国晶睿通讯(VIVOTEK)公司的一系列网络摄像机产品。 使用0x06x版本至0x08x版本固件的VIVOTEK Network Camera系列产品中的syslog.html文件存在跨站脚本漏洞,远程攻击者可借助HTTP Referer Header利用该漏洞执行任意JavaScript代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf

Reference
http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf https://blog.securityevaluators.com/vivotek-ip-camera-vulnerabilities-discovered-and-exploited-2e2531ecd244
Impacted products
Name
Vivotek Network Cameras >=0x06x,<=0x08x(固件)
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-18244"
    }
  },
  "description": "VIVOTEK Network Camera Series\u662f\u4e2d\u56fd\u6676\u777f\u901a\u8baf\uff08VIVOTEK\uff09\u516c\u53f8\u7684\u4e00\u7cfb\u5217\u7f51\u7edc\u6444\u50cf\u673a\u4ea7\u54c1\u3002\n\n\u4f7f\u75280x06x\u7248\u672c\u81f30x08x\u7248\u672c\u56fa\u4ef6\u7684VIVOTEK Network Camera\u7cfb\u5217\u4ea7\u54c1\u4e2d\u7684syslog.html\u6587\u4ef6\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9HTTP Referer Header\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610fJavaScript\u4ee3\u7801\u3002",
  "discovererName": "unknown",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2019-00363",
  "openTime": "2019-01-04",
  "patchDescription": "VIVOTEK Network Camera Series\u662f\u4e2d\u56fd\u6676\u777f\u901a\u8baf\uff08VIVOTEK\uff09\u516c\u53f8\u7684\u4e00\u7cfb\u5217\u7f51\u7edc\u6444\u50cf\u673a\u4ea7\u54c1\u3002\r\n\r\n\u4f7f\u75280x06x\u7248\u672c\u81f30x08x\u7248\u672c\u56fa\u4ef6\u7684VIVOTEK Network Camera\u7cfb\u5217\u4ea7\u54c1\u4e2d\u7684syslog.html\u6587\u4ef6\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9HTTP Referer Header\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610fJavaScript\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "VIVOTEK Network Camera\u7cfb\u5217\u4ea7\u54c1\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Vivotek Network Cameras \u003e=0x06x\uff0c\u003c=0x08x\uff08\u56fa\u4ef6\uff09"
  },
  "referenceLink": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf\r\nhttps://blog.securityevaluators.com/vivotek-ip-camera-vulnerabilities-discovered-and-exploited-2e2531ecd244",
  "serverity": "\u4e2d",
  "submitTime": "2019-01-04",
  "title": "VIVOTEK Network Camera\u7cfb\u5217\u4ea7\u54c1\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…