How to Buy
This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.
The remote multi-function device allows an attacker to gain access to
the device without authorization.
According to its model number and software version, the remote host
is a Xerox WorkCentre device that is affected by two authorization
bypass vulnerabilities :
- The web interface reportedly includes a script named
'YoUgoT_It.php' that will calculate a checksum for a
specified folder name that will allow an attacker to
access password-protected scan folders.
- The web interface reportedly contains multiple scripts
that fail to call 'die()' or 'exit()' after issuing a
redirect to a login page when a visitor is not logged
in and before running the rest of the script. It also
contains scripts that are normally referenced within
framesets that require credentials even though the
scripts themselves do not when called directly.
See also :
Apply the P41v7 patch as described in the Xerox security bulletin
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.4
Public Exploit Available : true
Nessus Plugin ID: 44944 ()
Bugtraq ID: 37921
CVE ID: CVE-2010-0548
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.