Share
## https://sploitus.com/exploit?id=PACKETSTORM:153494
FaceSentry Access Control System 6.4.8 Reflected Cross-Site Scripting  
  
  
Vendor: iWT Ltd.  
Product web page: http://www.iwt.com.hk  
Affected version: Firmware 6.4.8 build 264 (Algorithm A16)  
Firmware 5.7.2 build 568 (Algorithm A14)  
Firmware 5.7.0 build 539 (Algorithm A14)  
  
Summary: FaceSentry 5AN is a revolutionary smart identity  
management appliance that offers entry via biometric face  
identification, contactless smart card, staff ID, or QR-code.  
The QR-code upgrade allows you to share an eKey with guests  
while you're away from your Office and monitor all activity  
via the web administration tool. Powered by standard PoE  
(Power over Ethernet), FaceSEntry 5AN can be installed in  
minutes with only 6 screws. FaceSentry 5AN is a true enterprise  
grade access control or time-and-attendance appliance.  
  
Desc: FaceSentry is vulnerable to multiple cross-site scripting  
vulnerabilities. This issue is due to the application's failure  
to properly sanitize user-supplied input thru the 'msg' parameter  
(GET) in pluginInstall.php script. An attacker may leverage any  
of the cross-site scripting issues to have arbitrary script code  
executed in the browser of an unsuspecting user in the context  
of the affected site. This may facilitate the theft of cookie-based  
authentication credentials, phishing, as well as other attacks.  
  
Tested on: Linux 4.14.18-sunxi (armv7l) Ubuntu 16.04.4 LTS (Xenial Xerus)  
Linux 3.4.113-sun8i (armv7l)  
PHP/7.0.30-0ubuntu0.16.04.1  
PHP/7.0.22-0ubuntu0.16.04.1  
lighttpd/1.4.35  
Armbian 5.38  
Sunxi Linux (sun8i generation)  
Orange Pi PC +  
  
  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
@zeroscience  
  
  
Advisory ID: ZSL-2019-5527  
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5527.php  
  
  
28.05.2019  
  
--  
  
http://192.168.11.1/pluginInstall.php?msg=%22%3E%3Cmarquee%3Etestingus%3C/marquee%3E  
http://192.168.11.1/pluginInstall.php?msg=Reflected</div><script>confirm('XSS.')</script>