On the RICOH SP 4510SF printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/149441/RICOH-SP-4510SF-Printer-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/149441/RICOH-SP-4510SF-Printer-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 03:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/149441/RICOH-SP-4510SF-Printer-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-09-21 17:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-17001
Mitre link : CVE-2018-17001
CVE.ORG link : CVE-2018-17001
JSON object : View
Products Affected
ricoh
- sp_4510sf
- sp_4510sf_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
