Chiyu Technology fingerprint access control contains multiple vulnerabilities
Vulnerability Note VU#360431
Original Release Date: 2015-07-31 | Last Revised: 2015-07-31
Multiple models of Chiyu Technology fingerprint access control devices contain a cross-site scripting (XSS) vulnerability and an authentication bypass vulnerability.
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) - CVE-2015-2870
According to the reporter, <script> tags are not filtered out of a URL passed to the device, allowing an attacker to perform a reflected XSS attack.
CWE-288: Authentication Bypass Using an Alternate Path or Channel - CVE-2015-2871
According to the reporter, an attacker can view and modify the existing configuration of the device without authentication by directly accessing known paths. The path varies slightly depending on model and services available.
http://<host>/net.htm - Communication settings
Model BF-630, BF-630W:
http://<host>/voice.htm - Voice Time Set http://<host>/bf.htm - UniFinger Setup
The reporter has identified models BF-660C, BF-630, BF-630W as being vulnerable; other models may also be vulnerable.
The CERT/CC has been unable to verify this information with the vendor.
The CVSS score below is based on CVE-2015-2871.
An unauthenticated remote attacker may be able to view or modify device configuration, or obtain user credentials.
The CERT/CC is currently unaware of a practical solution to this problem.