vendor:
ZKBioSecurity 3.0
by:
Gjoko 'LiquidWorm' Krstic
7,5
CVSS
HIGH
Local Authorization Bypass
287
CWE
Product Name: ZKBioSecurity 3.0
Affected Version From: 3.0.1.0_R_230
Affected Version To: 2.0.1.0_R_877
Patch Exists: YES
Related CWE: N/A
CPE: a:zkteco:zkteco_zkbiosafety_3.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows 7 Ultimate SP1 (EN), Microsoft Windows 7 Professional SP1 (EN), Apache-Coyote/1.1, Apache Tomcat/7.0.56
2016
ZKTeco ZKBioSecurity 3.0 (visLogin.jsp) Local Authorization Bypass
The issue exist due to the way visLogin.jsp script processes the login request via the 'EnvironmentUtil.getClientIp(request)' method. It runs a check whether the request is coming from the local machine and sets the ip variable to '127.0.0.1' if equal to 0:0:0:0:0:0:0:1. The ip variable is then used as a username value with the password '123456' to authenticate and disclose sensitive information and/or do unauthorized actions.
Mitigation:
Upgrade to the latest version of ZKTeco ZKBioSecurity 3.0