The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to authentication bypass on the page /home.jsp. An unauthenticated attacker able to connect to the device's web interface can get a copy of the documents uploaded by any users. NOTE: this is fixed in the latest version.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Mar/24 | Exploit Third Party Advisory |
https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/ | Third Party Advisory |
http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Mar/24 | Exploit Third Party Advisory |
https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/Mar/24 - Exploit, Third Party Advisory | |
References | () https://www.redtimmy.com/red-teaming/hacking-the-oce-colorwave-printer-when-a-quick-security-assessment-determines-the-success-of-a-red-team-exercise/ - Third Party Advisory |
Information
Published : 2020-03-19 23:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10669
Mitre link : CVE-2020-10669
CVE.ORG link : CVE-2020-10669
JSON object : View
Products Affected
canon
- oce_colorwave_500
- oce_colorwave_500_firmware
CWE
CWE-287
Improper Authentication