The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Stored XSS in /TemplateManager/indexExternalLocation.jsp. The vulnerable parameter is map(template_name). NOTE: this is fixed in the latest version.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Mar/24 | Third Party Advisory |
https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Mar/24 | Third Party Advisory |
https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/Mar/24 - Third Party Advisory | |
References | () https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/ - Exploit, Third Party Advisory |
Information
Published : 2020-03-19 19:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10667
Mitre link : CVE-2020-10667
CVE.ORG link : CVE-2020-10667
JSON object : View
Products Affected
canon
- oce_colorwave_500
- oce_colorwave_500_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')