ID CVE-2019-13167 Type cve Reporter cve@mitre.org Modified 2020-03-18T17:49:00
Description
Multiple Stored XSS vulnerabilities were found in the Xerox Web Application, used by the Phaser 3320 V53.006.16.000 and other printers. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.
{"id": "CVE-2019-13167", "bulletinFamily": "NVD", "title": "CVE-2019-13167", "description": "Multiple Stored XSS vulnerabilities were found in the Xerox Web Application, used by the Phaser 3320 V53.006.16.000 and other printers. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.", "published": "2020-03-13T19:15:00", "modified": "2020-03-18T17:49:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13167", "reporter": "cve@mitre.org", "references": ["https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/", "https://security.business.xerox.com/"], "cvelist": ["CVE-2019-13167"], "type": "cve", "lastseen": "2020-10-03T13:38:42", "edition": 4, "viewCount": 48, "enchantments": {"dependencies": {"references": [], "modified": "2020-10-03T13:38:42", "rev": 2}, "score": {"value": 3.5, "vector": "NONE", "modified": "2020-10-03T13:38:42", "rev": 2}, "vulnersScore": 3.5}, "cpe": ["cpe:/o:xerox:phaser_3320_firmware:v53.006.16.000"], "affectedSoftware": [{"cpeName": "xerox:phaser_3320_firmware", "name": "xerox phaser 3320 firmware", "operator": "eq", "version": "v53.006.16.000"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, "cpe23": ["cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*"], "cwe": ["CWE-79"], "scheme": null, "affectedConfiguration": [{"cpeName": "xerox:phaser_3320", "name": "xerox phaser 3320", "operator": "eq", "version": "-"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}]}}