CHT Security Red Team Discovered Several Vulnerabilities in Well-Known Identity Authentication System

【Summary】

Vulnerability List

1st Vulnerability: Local File Inclusion

2nd Vulnerability: XSS


【Details】 

1. Local File Inclusion

Description

Lack of access control of sensitive files. By manipulating specific parameters, any files on the server could be obtained easily. Sensitive information such as JSP file source code, configuration files, and even binary files might be in dangerous.


Impact

With the product, it might be difficult to maintain the Confidentiality.


【Known Affected Software】IDExpert version before 2.7.3.231030


2. XSS

Description

Caused by not sanitizing the input value on the server side. Furthermore, web server combines dangerous strings and real content to render HTML source code.


Impact

With the product, relative client browsers might fall into threats.


Known Affected SoftwareIDExpert version before 2.7.3.231030




Credits

Yu-Jen Lai (CHT Security)