POC详情: 462e102c6773991e98265b746de9d594c00b8aeb

来源
关联漏洞
标题: TVT数码科技 TVT NVMS-1000 路径遍历漏洞 (CVE-2019-20085)
描述:TVT数码科技 TVT NVMS-1000是中国TVT数码科技公司的一套网络监控视频管理系统。 TVT数码科技 TVT NVMS-1000中存在路径遍历漏洞。远程攻击者可通过发送包含/../的特制URL请求利用该漏洞查看系统上的任意文件。
描述
A repository used for Hackthebox ServMon Machine
介绍
# 📂 CVE-2019-20085 – TVT NVMS-1000 Directory Traversal Exploit (By Z3R0)

> **Author:** Z3R0
> **CVE:** [CVE-2019-20085](https://nvd.nist.gov/vuln/detail/CVE-2019-20085)
> **Target:** TVT NVMS-1000 (all known versions prior to patch)
> **Vuln Type:** Unauthenticated Directory Traversal
> **Date:** \[Insert Your Release Date]

---

## 🔍 Vulnerability Summary

TVT's NVMS-1000 software contains a directory traversal vulnerability in its web server component. By sending a specially crafted `GET` request using `/..` sequences, an unauthenticated attacker can access **arbitrary files on the underlying OS**, including sensitive configuration files, password hashes, or system keys.

---

## ⚠️ Affected Software

* **Product:** TVT NVMS-1000
* **Versions:** All versions before vendor fix (typically <= v3.x.x)
* **Platform:** Windows

---

## 💥 Exploit Description

This exploit abuses the vulnerable file path resolution in the HTTP server running on NVMS-1000. There is **no authentication required**. A remote attacker can read any file accessible to the service user.

### 🧪 Example Malicious Request

```
GET /..%5C..%5C..%5C..%5Cwindows%5Cwin.ini HTTP/1.1
Host: <target-ip>:80
```

### 🗂️ Files You Can Dump

* Windows system files (e.g., `C:\Windows\win.ini`)
* NVMS config files (often contain base64-encoded or plaintext creds)
* User data directories

---

## 🚀 Usage

### ✅ Requirements

* Python 3.x
* `requests` module (`pip install requests`)

### ▶️ Run the Exploit

```bash
git clone https://github.com/Z3R0-0x30/CVE-2019-20085.git
cd CVE-2019-20085
python3 exploit.py http://domain.local/ ../../windows/win.ini win.ini"
```

---

## ⚠️ Disclaimer

> This exploit is released **for educational and authorized security research purposes only**.
> The author **Z3R0** is not responsible for any misuse or unauthorized access.
> Always get proper authorization before testing systems.

---

## 📚 References
- [Exploitdb](https://www.exploit-db.com/exploits/47774)
- [NVD - CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20085)
文件快照

[4.0K] /data/pocs/462e102c6773991e98265b746de9d594c00b8aeb ├── [1.1K] CVE-2019-20085.py └── [2.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。