Multiple models of Chiyu Technology fingerprint access control devices contain a cross-site scripting (XSS) vulnerability and an authentication bypass vulnerability.
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) - CVE-2015-2870
According to the reporter,
<script> tags are not filtered out of a URL passed to the device, allowing an attacker to perform a reflected XSS attack.
CWE-288: Authentication Bypass Using an Alternate Path or Channel - CVE-2015-2871
According to the reporter, an attacker can view and modify the existing configuration of the device without authentication by directly accessing known paths. The path varies slightly depending on model and services available.
http://<host>/net.htm - Communication settings
Model BF-630, BF-630W:
http://<host>/voice.htm - Voice Time Set
http://<host>/bf.htm - UniFinger Setup
The reporter has identified models BF-660C, BF-630, BF-630W as being vulnerable; other models may also be vulnerable.
The CERT/CC has been unable to verify this information with the vendor.
The CVSS score below is based on CVE-2015-2871.
An unauthenticated remote attacker may be able to view or modify device configuration, or obtain user credentials.
The CERT/CC is currently unaware of a practical solution to this problem.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: June 03, 2015 Updated: July 07, 2015
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal | 6.4 | E:POC/RL:U/RC:UR
Environmental | 4.8 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND
Thanks to Maxim Rupp for reporting this vulnerability to us.
This document was written by Garret Wassermann.