POC详情: 4314d193299b471c7c276e76e0ce4e57f5a07d49

来源
关联漏洞
标题: Argus Surveillance Dvr 加密问题漏洞 (CVE-2022-25012)
描述:Argus Surveillance Dvr是美国Argus Surveillance公司的一个安全混合平台的通用软件。可与无线和有线 Ip 摄像机、电视板、采集卡、电力线和 Usb 摄像机同时工作。 Argus Surveillance DVR v4.0版本存在安全漏洞,该漏洞源于软件采用弱密码加密。
描述
Updated version of this weak password encryption script
介绍
# Argus Surveillance DVR 4.0 - Weak Password Encryption
## CVE-2022-25012
Updated version of this weak password encryption script

Exploit DB REF: https://www.exploit-db.com/exploits/50130

Author REF: https://deathflash1411.github.io/blog/dvr4-hash-crack

NIST REF: https://nvd.nist.gov/vuln/detail/CVE-2022-25012

## Description:
The author had stated that they didnt make additional entries for special ASCII characters. 
I have updated this to include them and provide a password output to make it more user friendly
as well as it accepting arguements rather than needing to edit the script to place the password hash.

## Usage

`python3 CVE-2022-25012.py <hash>`

Example:

`python3 CVE-2022-25012.py E1B0BD8F4D7B73573F7EF539A935735753D190839083C165BD8FCA79418DB398F7DF`



## Generating our own proof of concept

We set a complex password in the argus DVR user screen

![image](https://user-images.githubusercontent.com/60675004/229265535-5a17dbe9-0de1-4800-9605-0b644745f533.png)

Using other avenues to gain access to the following file: `C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini`

We can see the entry for our user and corresponding password:

![image](https://user-images.githubusercontent.com/60675004/229265593-23edff63-3d29-48d4-acf9-49193dd73101.png)

We can then run this hash as an arguement (as seen in the usage example)

![image](https://user-images.githubusercontent.com/60675004/229265784-9c33acff-c749-461d-8f0b-4ca9a3130831.png)




文件快照

[4.0K] /data/pocs/4314d193299b471c7c276e76e0ce4e57f5a07d49 ├── [3.3K] CVE-2022-25012.py ├── [1.0K] LICENSE └── [1.4K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。