CHT Security Red Team Discovered Several Vulnerabilities in Well-Known Identity Authentication System
【Summary】
Vulnerability List
1st Vulnerability: Local File Inclusion
2nd Vulnerability: XSS
【Details】
1. Local File Inclusion
Description
Lack of access control of sensitive files. By manipulating specific parameters, any files on the server could be obtained easily. Sensitive information such as JSP file source code, configuration files, and even binary files might be in dangerous.
Impact
With the product, it might be difficult to maintain the Confidentiality.
【Known Affected Software】IDExpert version before 2.7.3.231030
2. XSS
Description
Caused by not sanitizing the input value on the server side. Furthermore, web server combines dangerous strings and real content to render HTML source code.
Impact
With the product, relative client browsers might fall into threats.
【Known Affected Software】IDExpert version before 2.7.3.231030
Credits
Yu-Jen Lai (CHT Security)