Xerox WorkCentre Authorization Bypass Vulnerabilities (XRX10-002)

high Nessus Plugin ID 44944

Synopsis

The remote multi-function device allows an attacker to gain access to the device without authorization.

Description

According to its model number and software version, the remote host is a Xerox WorkCentre device that is affected by two authorization bypass vulnerabilities :

- The web interface reportedly includes a script named 'YoUgoT_It.php' that will calculate a checksum for a specified folder name that will allow an attacker to access password-protected scan folders.

- The web interface reportedly contains multiple scripts that fail to call 'die()' or 'exit()' after issuing a redirect to a login page when a visitor is not logged in and before running the rest of the script. It also contains scripts that are normally referenced within framesets that require credentials even though the scripts themselves do not when called directly.

Solution

Apply the P41v7 patch as described in the Xerox security bulletin referenced above.

See Also

http://www.nessus.org/u?eef14f03

https://www.securityfocus.com/archive/1/509684/30/0/threaded

https://www.xerox.com/downloads/usa/en/c/cert_XRX10-002_v1.0.pdf

Plugin Details

Severity: High

ID: 44944

File Name: xerox_xrx10-002.nasl

Version: 1.9

Type: remote

Family: Misc.

Published: 3/1/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: cpe:/h:xerox:workcentre

Required KB Items: www/xerox_workcentre

Exploit Ease: No known exploits are available

Patch Publication Date: 1/22/2010

Vulnerability Publication Date: 2/22/2010

Reference Information

CVE: CVE-2010-0548

BID: 37921

CWE: 200