21 lines
No EOL
837 B
Text
21 lines
No EOL
837 B
Text
# Exploit Title: RICOH Web Image Monitor 1.09 - HTML Injection
|
|
# Date: 2019-05-06
|
|
# Exploit Author: Ismail Tasdelen
|
|
# Vendor Homepage: https://www.ricoh.com/
|
|
# Hardware Link: http://support-download.com/services/device/webhlp/nb/gen/v140cc1/en/p_top010.html
|
|
# Software: RICOH Web Image Monitor
|
|
# Product Version: v1.09
|
|
# Vulernability Type: Code Injection
|
|
# Vulenrability: HTML Injection
|
|
# CVE: N/A
|
|
|
|
# Descripton :
|
|
# It has been discovered that in the v1.09 version of Image Monitor from
|
|
# RICOH, HTML Injection can be run on the /web/entry/en/address/adrsSetUserWizard.cgi
|
|
# function. This vulnerability affected all hardware that uses the entire
|
|
# Image Monitor v1.09.
|
|
|
|
# Attack Vectors :
|
|
|
|
You can run HTML Injection on the entryNameIn and entryDisplayNameIn in the corresponding function.
|
|
HTML Injection Payload : "><h1>ismailtasdelen |