Skip to content

Sharp Multifunction Printers - Cookie Exposure

ID: CVE-2024-33610

Severity: medium

Author: gy741

Tags: cve,cve2024,sharp,printer,exposure

It was observed that Sharp printers are vulnerable to a listing of session cookies without authentication. Any attacker can list valid cookies by visiting a backdoor webpage and use them to authenticate to the printers.

id: CVE-2024-33610
info:
name: Sharp Multifunction Printers - Cookie Exposure
author: gy741
severity: medium
description: It was observed that Sharp printers are vulnerable to a listing of session cookies without authentication. Any attacker can list valid cookies by visiting a backdoor webpage and use them to authenticate to the printers.
impact: |
The exposure of cookies can lead to session hijacking, unauthorized access, and potential data breaches.
remediation: |
Apply all relevant security patches and product upgrades.
reference:
- https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html#pre-auth-cookies
- https://jvn.jp/en/vu/JVNVU93051062/index.html
- https://global.sharp/products/copier/info/info_security_2024-05.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2024-33610
cwe-id: CWE-284
metadata:
verified: true
max-request: 1
shodan-query: "Set-Cookie: MFPSESSIONID="
tags: cve,cve2024,sharp,printer,exposure
http:
- method: GET
path:
- "{{BaseURL}}/sessionlist.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'No.'
- 'User'
- 'From'
- 'Last login'
- 'Last access'
- 'Language ID'
- 'Cookie'
condition: and
- type: word
part: header
words:
- "Set-Cookie: MFPSESSIONID="
- type: status
status:
- 200
# digest: 4a0a00473045022100b5bda6361d8011c9063cd779176a0fbc12bac9dbfee4be2a0a565bc688a9cd9d02202a9ae84be5697938973f089b833e52a4e9dfb1860ec41bc0d946294ccead2c33:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-33610.yaml"

View on Github