During a recent penetration test, I stumbled upon an instance of the ZKTeco BioTime web application. This application was linked to a time punch clock taking pictures of employees. The management can then analyse these pictures through the web application or an app.
Through some directory fuzzing, I discovered the world-readable directories /files/photo
and /files/biophoto
. These directories contained the aforementioned pictures, which were viewable without authenticating to the web app. Since the filename structure used in the web application was incremental, brute-forcing all images present was trivial.
Key | Value |
---|---|
Product | ZKTeco BioTime |
Vendor | ZKTeco Co., Ltd |
Tested Versions | 8.5.4 - 8.5.5 (Build:20221013.1414beta) |
Fixed Version | Unresolved |
Vulnerability Type | Improper Access Control |
CVSSv3.1 Severity | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
CWE Reference | CWE-306 |
CVE Reference | CVE-2022-30515 |
Proof of Concept
Remediation
The vendor failed to respond to any communication, leaving the vulnerability present in a default installation. It is recommended to implement access restrictions to prevent access to this data.
Disclosure Timeline
Date | Event |
---|---|
February 2022 | Vulnerability Discovered |
2022-05-09 | Vendor contacted |
2022-05-16 | Second contact attempt |
2022-11-05 | Vulnerability Published |