Directory Traversal in Safescan Timemoto and TA-8000 series version 1.0 allows unauthenticated remote attackers to execute code via the administrative API.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://safescan.com/ | product |
https://github.com/ProCheckUp/SafeScan | third party advisory exploit |
https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ | third party advisory exploit |
https://support.timemoto.com/en/s/safescan-time-clock-systems/a/firmware-update-7-dot-03-dot-100-ta8000-14 | vendor advisory |