CVE-2023-6893

A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) and classified as problematic. Affected by this issue is some unknown functionality of the file /php/exportrecord.php. The manipulation of the argument downname with the input C:\ICPAS\Wnmp\WWW\php\conversion.php leads to path traversal. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248252.
References
Link Resource
https://vuldb.com/?id.248252 Third Party Advisory
https://vuldb.com/?ctiid.248252 Permissions Required Third Party Advisory
https://github.com/willchen0011/cve/blob/main/download.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:*
OR cpe:2.3:h:hikvision:ds-kd-bk:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-dis:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-e:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-in:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-info:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kk:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kk\/s:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kp:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kp\/s:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-m:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd3003-e6:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/flush:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/ns:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/s:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/surface:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6220-le1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-le1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-tde1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-te1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-wtde1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6350-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6351-te1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6351-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh63le1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh8520-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh9310-wte1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh9510-wte1\(b\):-:*:*:*:*:*:*:*

History

20 Dec 2023, 19:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://vuldb.com/?id.248252 - () https://vuldb.com/?id.248252 - Third Party Advisory
References () https://github.com/willchen0011/cve/blob/main/download.md - () https://github.com/willchen0011/cve/blob/main/download.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.248252 - () https://vuldb.com/?ctiid.248252 - Permissions Required, Third Party Advisory
CPE cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/surface:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-e:-:*:*:*:*:*:*:*
cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kp\/s:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh9510-wte1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/ns:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-info:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh8520-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-m:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kk\/s:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/s:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\)\/flush:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-tde1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-dis:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6220-le1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh63le1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-wtde1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-bk:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kp:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6351-te1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd3003-e6:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-kk:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-te1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6350-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6351-wte1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh6320-le1:-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd8003ime1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kh9310-wte1\(b\):-:*:*:*:*:*:*:*
cpe:2.3:h:hikvision:ds-kd-in:-:*:*:*:*:*:*:*
First Time Hikvision ds-kh6320-le1
Hikvision ds-kd-dis
Hikvision ds-kd8003ime1\(b\)\/ns
Hikvision ds-kh6320-wte1
Hikvision ds-kh6320-wtde1
Hikvision ds-kh6320-tde1
Hikvision ds-kd3003-e6
Hikvision ds-kd-bk
Hikvision ds-kh6220-le1
Hikvision ds-kh6351-wte1
Hikvision ds-kh6351-te1
Hikvision ds-kh8520-wte1
Hikvision intercom Broadcast System
Hikvision ds-kh6320-te1
Hikvision ds-kh6350-wte1
Hikvision ds-kh9510-wte1\(b\)
Hikvision ds-kd-m
Hikvision ds-kd8003ime1\(b\)\/flush
Hikvision ds-kd-kk
Hikvision ds-kd-in
Hikvision ds-kd-kk\/s
Hikvision ds-kd-kp
Hikvision ds-kh9310-wte1\(b\)
Hikvision ds-kd-info
Hikvision ds-kh63le1\(b\)
Hikvision ds-kd8003ime1\(b\)\/surface
Hikvision ds-kd8003ime1\(b\)
Hikvision ds-kd8003ime1\(b\)\/s
Hikvision ds-kd-e
Hikvision ds-kd-kp\/s
Hikvision

18 Dec 2023, 15:15

Type Values Removed Values Added
Summary A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) and classified as problematic. Affected by this issue is some unknown functionality of the file /php/exportrecord.php. The manipulation of the argument downname with the input C:\ICPAS\Wnmp\WWW\php\conversion.php leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248252. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) and classified as problematic. Affected by this issue is some unknown functionality of the file /php/exportrecord.php. The manipulation of the argument downname with the input C:\ICPAS\Wnmp\WWW\php\conversion.php leads to path traversal. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248252.

17 Dec 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-17 07:15

Updated : 2024-05-17 02:33


NVD link : CVE-2023-6893

Mitre link : CVE-2023-6893


JSON object : View

Products Affected

hikvision

  • ds-kd8003ime1\(b\)\/flush
  • ds-kh6320-le1
  • ds-kh6220-le1
  • ds-kh6351-wte1
  • ds-kd8003ime1\(b\)\/ns
  • ds-kd3003-e6
  • ds-kh8520-wte1
  • ds-kd-kp
  • ds-kd8003ime1\(b\)\/s
  • ds-kd-in
  • ds-kh9310-wte1\(b\)
  • ds-kd-kk\/s
  • ds-kh6351-te1
  • ds-kd-info
  • ds-kd8003ime1\(b\)
  • ds-kd-kk
  • intercom_broadcast_system
  • ds-kh63le1\(b\)
  • ds-kh9510-wte1\(b\)
  • ds-kd-dis
  • ds-kh6320-wte1
  • ds-kh6350-wte1
  • ds-kd-bk
  • ds-kh6320-tde1
  • ds-kh6320-wtde1
  • ds-kd-kp\/s
  • ds-kd-e
  • ds-kd-m
  • ds-kd8003ime1\(b\)\/surface
  • ds-kh6320-te1
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')