CVE-2018-9156

An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality
References
Link Resource
https://www.slideshare.net/secret/aewA1dZwZ9FQ8g Exploit Third Party Advisory
https://www.slideshare.net/secret/aewA1dZwZ9FQ8g Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:axis:p1354_firmware:5.90.1.1:*:*:*:*:*:*:*
cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:15

Type Values Removed Values Added
References () https://www.slideshare.net/secret/aewA1dZwZ9FQ8g - Exploit, Third Party Advisory () https://www.slideshare.net/secret/aewA1dZwZ9FQ8g - Exploit, Third Party Advisory

07 Nov 2023, 03:01

Type Values Removed Values Added
Summary ** DISPUTED ** An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality. An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality

Information

Published : 2018-04-01 18:29

Updated : 2024-11-21 04:15


NVD link : CVE-2018-9156

Mitre link : CVE-2018-9156

CVE.ORG link : CVE-2018-9156


JSON object : View

Products Affected

axis

  • p1354
  • p1354_firmware
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type