Lucene search

K

CVE-2024-27141

🗓️ 14 Jun 2024 03:09:15Reported by ToshibaType 
cve
 cve
🔗 web.nvd.nist.gov👁 41 Views🌐 WEB

Toshiba printers vulnerable to XXE attac

Show more
Related
Affected
Refs
Paths
[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Linux"
    ],
    "product": "Toshiba Tec e-Studio multi-function peripheral (MFP)",
    "vendor": "Toshiba Tec Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "see the reference URL"
      }
    ]
  }
]
ParameterPositionPathDescriptionCWE
CSRFpIdrequest body/contentwebserverThe Toshiba printers are vulnerable to Pre-authenticated Blind XML External Entity (XXE) injection, allowing denial of service or potential data exfiltration.CWE-776
Content-Lengthrequest body/contentwebserverThe Toshiba printers are vulnerable to Pre-authenticated Blind XML External Entity (XXE) injection, allowing denial of service or potential data exfiltration.CWE-776
Namerequest body/contentwebserver/uploadAn attacker can upload files to the printer without authentication, using the insecure file upload endpoint, potentially leading to Remote Code Execution.CWE-776
formSubmitCompleteEventHandlerrequest body/contentwebserver/uploadAn attacker can upload files to the printer without authentication, using the insecure file upload endpoint, potentially leading to Remote Code Execution.CWE-776
DeviceInformationModelrequest body/contentwebserver/uploadAn attacker can upload files to the printer without authentication, using the insecure file upload endpoint, potentially leading to Remote Code Execution.CWE-776
CsrfpIdrequest body/contentwebserver/uploadAn attacker can upload files to the printer without authentication, using the insecure file upload endpoint, potentially leading to Remote Code Execution.CWE-776
Sessionrequest body/tapy/server/appmgmt/applistDeployedThe API allows for remote code execution via insecure server logic executed in the environment that serves the printer.CWE-776
ramdisk/work/logpath/ramdisk/work/logLogs contain authentication session IDs and passwords stored in clear-text, making it possible for attackers to hijack user sessions.CWE-322

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 Jun 2024 03:15Current
6.1Medium risk
Vulners AI Score6.1
CVSS35.9
EPSS0.00317
SSVC
41
.json
Report