A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://zkteco.com | product |
https://claroty.com/team82/disclosure-dashboard/cve-2023-38950 | third party advisory |
https://sploitus.com/exploit?id=PACKETSTORM:177859 | exploit |
https://www.fortinet.com/content/dam/fortinet/assets/reports/report-incident-response-middle-east.pdf | technical description |