Iris ID IrisAccess ICU 7000-2 Remote Root Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 28 Jul 2016.

  1. Packet Storm

    Packet Storm Guest

    The Iris ID IrisAccess ICU 7000-2 device suffers from an unauthenticated remote command execution vulnerability. The vulnerability exist due to several POST parameters in the '/html/SetSmarcardSettings.php' script not being sanitized when using the exec() PHP function while updating the Smart Card Settings on the affected device. Calling the '$CommandForExe' variable which is set to call the '/cgi-bin/setsmartcard' CGI binary with the affected parameters as arguments allows the attacker to execute arbitrary system commands as the root user and bypass the biometric access control in place.

    Continue reading...
     

Share This Page

Loading...