Description
ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache Tomcat server that allow unauthenticated attackers to access the manager application. Attackers can authenticate with hardcoded credentials stored in tomcat-users.xml to upload malicious WAR archives containing JSP applications and execute arbitrary code with SYSTEM privileges.
Problem types
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5362.php (Zero Science Lab Disclosure)
cxsecurity.com/issue/WLB-2016080266 (CXSecurity)
exchange.xforce.ibmcloud.com/vulnerabilities/116484 (IBM X-Force Exchange)
packetstormsecurity.com/files/138567 (Packet Storm Security)
www.exploit-db.com/exploits/40324/ (Reference)
www.vulncheck.com/...coded-credentials-remote-code-execution (VulnCheck Advisory: ZKTeco ZKBioSecurity 3.0 Hardcoded Credentials Remote Code Execution)