exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Longshine Multiple Print Servers Cross Site Scripting

Longshine Multiple Print Servers Cross Site Scripting
Posted Apr 4, 2011
Authored by b0telh0 | Site gotgeek.com.br

Longshine Multiple Print Servers suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e9739bb3fb22f3cb02183f303617b0b9935d7800671c26fe5abb88c7acf7bdfe

Longshine Multiple Print Servers Cross Site Scripting

Change Mirror Download
GotGeek Labs
http://www.gotgeek.com.br/

Longshine Multiple Print Servers Cross-site Scripting Vulnerability



[+] Description

LCS-PS110:
The LCS-PS110 Parallel-Port-Printserver enables you to share your printer
in the whole network from every workstation. This multiprotocol printserver
supports the most common network protocols and operating systems. For
easy configuration and administration it supports SNMP, Web-Interface and
other configuration and management tools.

LCS-PS101-A:
The LCS-PS101-A is a small, handy Printserver for Printers with USB-Connector.
The Printserver is the comfortable solution to connect Ink, Colour, Laser
or Pinprinter to your Network with 10 or 100Mbit/s. The Printer will be
connected over a high-speed USB 2.0 standard port. It supports the most common
Operating Systems. You can configure and administrate the Printserver with
several Software and Web-Interfaces. The Printserver is the ideal device for
flexible operations in envirements like Home-Offices or small and middle
sized Offices.

LCS-PS112:
The LCS-PS112 Printserver connects your Printers directly to the Network
and gives every workstation in the network access for printing. The LCS–PS112
provides 2 x USB printerports and 1x Parallel printerport enablinge three
Printers to share the whole Network. Easy and fast to configure with the
PS-Admin-Tool. The LCS-PS112 is the right solution for small offices but also
a Enterprise solution for Printerfarms.



[+] Information

Title: Longshine Multiple Print Servers Cross-site Scripting Vulnerability
Shodan Dork: ZOT-PS-47/9.8.0015 -WWW-Authenticate
ZOT-PS-35/6.2.0001 -WWW-Authenticate
ZOT-PS-39/6.3.0007 -WWW-Authenticate
Advisory: gg-010-2011
Date: 03-15-2011
Last update: 03-26-2011
Link: http://www.gotgeek.com.br/pocs/gg-010-2011.txt



[+] Vulnerabilities

Stored Cross-site Scripting:
Web interface from PS110, PS101-A and PS112 Print Servers are affected by stored
cross-site scripting vulnerability because it fails to properly sanitize
user-supplied input at "NDSContext" field in "NetWare NDS Settings" area.
An attacker may leverage this issue to execute arbitrary script code
in the browser of an unsuspecting user in the context of the affected site.

After injecting the XSS code, you need to access Netware status page.


Affected Versions:

Longshine LCS-PS110 Parallel-Port-Printserver
Firmware: 9.08.47L 0015 (ZOT-PS-47/9.8.0015)
8.02.30L (ZOT-PS-30/8.2.0004)

Longshine LCS-PS101-A USB-Printserver
Firmware: 9.08.47L 0015 (ZOT-PS-47/9.8.0015)
6.02.35L (ZOT-PS-35/6.2.0001)

Longshine LCS-PS112 Printserver
Firmware: 6.03.39L 0007 (ZOT-PS-39/6.3.0007)
6.03.39L 0004 (ZOT-PS-39/6.3.0004)

Other versions may also be vulnerable.



[+] Proof of Concept/Exploit

XSS:
http://target/RESTART.HTM?NDSContext=</script><script>alert("xss")</script><script>

and then..

http://target/NETWARE.HTM



[+] Timeline

24-03-2011: first contact to vendor.
29-03-2011: second contact to vendor.
03-04-2011: no vendor response.
04-04-2011: advisory published.



[+] References

http://www.longshine.de/longshine/products/printserver/PS110/PS110_eng.pdf
http://www.longshine.de/longshine/products/printserver/PS101-A/PS101-A_eng.pdf
http://www.longshine.de/longshine/products/printserver/PS112/PS112_eng.pdf



[+] Credits

b0telh0
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close