Improper Access Control in ZKTeco BioTime 8.5

Observation

It was observed that Application ZKTeco BioTime 8.5 is vulnerable to Personal Identification Data disclosure through unauthenticated access. Personal Information such as Employee’s First Name, Employee ID, Medical Report, Photos are accessible without authentication into the application
The directory files is accessible without authentication and corresponding folders unders the files directory are able to access without authentication.

POCs

Application Internal Files is dislosed through unauthenticated access.

image1

Employee details disclosed

image1

image1

image1

Risk

An attacker can get sensitive information about the Internal Employees, and this might lead to further attacks

Risk Mitigation

It is recommended to implement adequate access controls (authentication and authorization) to manage and limit access to all restricted URLs, functions, scripts or files. It should be ensured that authenticated users have access to only those functions and data they are authorized to access. These controls should be implemented at the server side

*****
When solving problems dig @ roots, instead of just hacking at the leaves.
made with ☕ and 🛠️