First published: Sun Apr 01 2018(Updated: )
** DISPUTED ** An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Axis P1354 Firmware | =5.90.1.1 | |
AXIS P1354 | ||
All of | ||
Axis P1354 Firmware | =5.90.1.1 | |
AXIS P1354 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9156 is a vulnerability found in AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices.
CVE-2018-9156 allows an attacker to upload a webshell by exploiting a file type verification issue on the upload web page of the devices.
CVE-2018-9156 has a severity score of 7.5 (high).
To fix CVE-2018-9156, upgrade the firmware of the AXIS P1354 IP camera to a version that is not affected by the vulnerability.
Yes, AXIS P1354 Firmware version 5.90.1.1 is vulnerable to CVE-2018-9156.