Skip to content

Sharp Multifunction Printers - Directory Listing

ID: CVE-2024-33605

Severity: high

Author: gy741

Tags: cve,cve2024,sharp,printer,traversal

It was observed that Sharp printers are vulnerable to an arbitrary directory listing without authentication. Any attacker can list any directory located in the printer and recover any file.

id: CVE-2024-33605
info:
name: Sharp Multifunction Printers - Directory Listing
author: gy741
severity: high
description: |
It was observed that Sharp printers are vulnerable to an arbitrary directory listing without authentication. Any attacker can list any directory located in the printer and recover any file.
remediation: |
Apply all relevant security patches and product upgrades.
reference:
- https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html#pre-auth-arbitrary-directory-listing
- https://jvn.jp/en/vu/JVNVU93051062/index.html
- https://global.sharp/products/copier/info/info_security_2024-05.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-33605
cwe-id: CWE-22
cpe: cpe:2.3:o:sharp:mx-3550v_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: "Set-Cookie: MFPSESSIONID="
product: mx-3550v_firmware
vendor: sharp
tags: cve,cve2024,sharp,printer,traversal
http:
- method: GET
path:
- "{{BaseURL}}/installed_emanual_list.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'ServiceEmanualList'
- '/installed_emanual_down.html'
condition: and
- type: word
part: header
words:
- "Set-Cookie: MFPSESSIONID="
- type: status
status:
- 200
# digest: 4b0a00483046022100ce67cf75fb8a98f96991e504f67525bcf3bc4c96d2387c472c13e2ce0d594f1e02210094987878f71ef961173f5d33b347e70b438c51a1dcaa32209960c05cbc5e7414:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-33605.yaml"

View on Github