Skip to content

Instantly share code, notes, and snippets.

@whiteman007
Last active June 25, 2024 12:20
Show Gist options
  • Save whiteman007/c8bf92b0294cd2f0cda6bfaca36f8f28 to your computer and use it in GitHub Desktop.
Save whiteman007/c8bf92b0294cd2f0cda6bfaca36f8f28 to your computer and use it in GitHub Desktop.
Vulnerability Title: Cross-Site Scripting (XSS) in biotime 8.5-9.5.2 2024/6/22
endor of Product:zkteco biotime
Vulnerability Description: refers to a Cross-Site Scripting (XSS) vulnerability present in [zkteco biotime]. This type of vulnerability allows attackers to inject malicious scripts into web pages viewed by other users. The injected scripts can be executed within the context of the victim's browser, potentially leading to the theft of sensitive information, session hijacking, or other malicious actions.
Root Cause: The vulnerability arises due to insufficient input sanitization in the adv arduis application, enabling attackers to inject malicious scripts into web pages.
Impact: Successful exploitation of this vulnerability can result in the compromise of user data, unauthorized access to sensitive information, session hijacking, and potentially the execution of arbitrary code within the context of the victim's browser.
poc:
go to biotime 8.5-9.5
login by use user:pass
go to
{system-group-add user}
and add user {code js} <script>alert('XSS')</script>
2-
go to
{personnel-employee-add new}
poc img
https://i.imghippo.com/files/NqHEm1719317999.png
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment