CVE-2023-38952

Insecure access control in ZKTeco BioTime through 9.0.1 allows authenticated attackers to escalate their privileges due to the fact that session ids are not validated for the type of user accessing the application by default. Privilege restrictions between non-admin and admin users are not enforced and any authenticated user can leverage admin functions without restriction by making direct requests to administrative endpoints.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zkteco:biotime:8.5.5:*:*:*:*:*:*:*

History

27 May 2025, 20:15

Type Values Removed Values Added
References
  • () https://github.com/omair2084/biotime-rce-8.5.5/blob/main/biotime_enum.py -
  • () https://krashconsulting.com/fury-of-fingers-biotime-rce/ -
  • () https://sploitus.com/exploit?id=PACKETSTORM:177859 -
Summary (en) Insecure access control in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read sensitive backup files and access sensitive information such as user credentials via sending a crafted HTTP request to the static files resources of the system. (en) Insecure access control in ZKTeco BioTime through 9.0.1 allows authenticated attackers to escalate their privileges due to the fact that session ids are not validated for the type of user accessing the application by default. Privilege restrictions between non-admin and admin users are not enforced and any authenticated user can leverage admin functions without restriction by making direct requests to administrative endpoints.

Information

Published : 2023-08-03 23:15

Updated : 2025-05-27 20:15


NVD link : CVE-2023-38952

Mitre link : CVE-2023-38952

CVE.ORG link : CVE-2023-38952


JSON object : View

Products Affected

zkteco

  • biotime
CWE
CWE-552

Files or Directories Accessible to External Parties