ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.
History

Sat, 24 May 2025 14:00:00 +0000

Type Values Removed Values Added
Description ZKTeco BioTime version 8.5.5 through 9.0.1 allows authenticated attackers to create or overwrite arbitrary files on the server by making specially crafted requests to '/base/sftpsetting/' endpoints that abuse a path traversal issue in the 'Username' field and a lack of input sanitization on the 'SSH Key' field. Overwriting specific files may lead to arbitrary code execution as the 'NT AUTHORITY\SYSTEM' user. ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.
References

Mon, 19 May 2025 21:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in ZKTeco BioTime v8.5.5 allows attackers to write arbitrary files via using a malicious SFTP configuration. ZKTeco BioTime version 8.5.5 through 9.0.1 allows authenticated attackers to create or overwrite arbitrary files on the server by making specially crafted requests to '/base/sftpsetting/' endpoints that abuse a path traversal issue in the 'Username' field and a lack of input sanitization on the 'SSH Key' field. Overwriting specific files may lead to arbitrary code execution as the 'NT AUTHORITY\SYSTEM' user.
References

Mon, 05 May 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-08-03T00:00:00.000Z

Updated: 2025-05-27T19:16:38.829Z

Reserved: 2023-07-25T00:00:00.000Z

Link: CVE-2023-38951

cve-icon Vulnrichment

Updated: 2024-08-02T17:54:39.698Z

cve-icon NVD

Status : Modified

Published: 2023-08-03T23:15:11.363

Modified: 2025-05-27T20:15:23.647

Link: CVE-2023-38951

cve-icon Redhat

No data.