{"id":141,"date":"2022-10-12T13:51:00","date_gmt":"2022-10-12T13:51:00","guid":{"rendered":"https:\/\/nobugescapes.com\/?p=141"},"modified":"2023-05-23T11:51:10","modified_gmt":"2023-05-23T11:51:10","slug":"creating-a-new-user-with-admin-privilege","status":"publish","type":"post","link":"https:\/\/nobugescapes.com\/blog\/creating-a-new-user-with-admin-privilege\/","title":{"rendered":"Creating a new user with admin Privilege"},"content":{"rendered":"\n

CVE-2023-31923<\/p>\n\n\n\n

Product & Service Introduction:<\/h3>\n\n\n\n

BioStar <\/a>2 is a web-based, open, and integrated security platform that provides comprehensive functionality for access control, time & attendance management, visitor management, and video log maintenance. It encrypts all personal data available and supports both SDKs and web APIs to integrate BioStar 2 with third-party software. In addition, users can control BioStar 2 platform remotely with the mobile app for BioStar 2 and manage a mobile access card that they can use to access sites.<\/p>\n\n\n\n

Technical Description:<\/h3>\n\n\n\n

On Bio star 2 web application there are 7 different Operator levels, each rule has a different privilege where the \u201cAdministrator<\/strong>\u201d has full permission to do everything on the web application while the \u201cUser Operator\u201d<\/strong> has limited privileges. But due to missing server-side validation, I identified a way to create a highly privileged user. An attacker should be authenticated to the target website and logged in as a \u201cUser Operator\u201d to exploit this vulnerability.<\/p>\n\n\n\n

The security risk of the vulnerability is High with a CVSS (common vulnerability scoring system) count of 8.8

Successful exploitation of the vulnerability results in gaining admin privilege giving the attacker the ability to control the entire system such as <\/p>\n\n\n\n