{"vuid":"VU#360431","idnumber":"360431","name":"Chiyu Technology fingerprint access control contains multiple vulnerabilities","keywords":["fingerprint","xss","authorization bypass"],"overview":"Multiple models of Chiyu Technology fingerprint access control devices contain a cross-site scripting (XSS) vulnerability and an authentication bypass vulnerability.","clean_desc":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) - CVE-2015-2870 According to the reporter, <script> tags are not filtered out of a URL passed to the device, allowing an attacker to perform a reflected XSS attack. CWE-288: Authentication Bypass Using an Alternate Path or Channel - CVE-2015-2871 According to the reporter, an attacker can view and modify the existing configuration of the device without authentication by directly accessing known paths. The path varies slightly depending on model and services available. Model BF-660C: http://<host>/net.htm  -  Communication settings Model BF-630, BF-630W: http://<host>/voice.htm   -  Voice Time Set\nhttp://<host>/bf.htm   -  UniFinger Setup The reporter has identified models BF-660C, BF-630, BF-630W as being vulnerable; other models may also be vulnerable. The CERT/CC has been unable to verify this information with the vendor. The CVSS score below is based on CVE-2015-2871.","impact":"An unauthenticated remote attacker may be able to view or modify device configuration, or obtain user credentials.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Maxim Rupp for reporting this vulnerability to us.","author":"This document was written by Garret Wassermann.","public":["http://cwe.mitre.org/data/definitions/80.html","http://cwe.mitre.org/data/definitions/288.html"],"cveids":["CVE-2015-2870","CVE-2015-2871"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-05-29T20:26:37Z","publicdate":"2015-07-31T00:00:00Z","datefirstpublished":"2015-07-31T16:35:40Z","dateupdated":"2015-07-31T18:20:20Z","revision":29,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.4","cvss_environmentalscore":"4.79953764322594","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}