-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Advisory ID: SYSS-2020-002
Product: Lexmark MX711de MFP
Manufacturer: Lexmark
Affected Version(s): LW75.TU.P278 and previous
Tested Version(s): LW73.TU.P034
Vulnerability Type: Cross-Site Scripting (CWE-79)
Risk Level: High
Solution Status: Fixed
Manufacturer Notification: 2020-03-20
Solution Date: 2020-06-26
Public Disclosure: 2020-07-28
CVE Reference: CVE-2020-13481
Author of Advisory: Daniel Reutter, SySS GmbH
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Overview:
Lexmark MX711de is a multi-function printer for copying, scanning,
printing and faxing.
The manufacturer describes the product as follows (see [1]):
"The Lexmark MX711de MFP with a customizable e-Task touch screen provides
print, copy, fax, scan and email functions. Included are 650 sheets of
standard input and 1GB of standard memory."
The printer's web interface is vulnerable to a persistent cross-site
scripting vulnerability.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Vulnerability Details:
The web interface of the Lexmark MX711de is vulnerable to a persistent
cross-site scripting weakness, since file names which are stored
on the printer are not sanitized.
The vulnerability can be used to run JavaScript code in the context of
an authenticated user if such a file exists on the internal hard drive
of the printer and the user navigates to the print directory.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Proof of Concept (PoC):
1. Upload a file with a name containing JavaScript, for instance,
"", to the internal hard drive
of the MFP. This can be achieved by using PostScript commands via the
tool PRET (see [4]).
2. Navigate to the print directory, located at:
http:///cgi-bin/dynamic/printer/config/reports/printdirectory.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution:
Update to firmware version LW75.TU.P279 or later [5]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclosure Timeline:
2019-11-20: Vulnerability discovered
2020-03-20: Vulnerability reported to manufacturer
2020-03-24: Vulnerability confirmed by the manufacturer
2020-06-26: Patch released by manufacturer
2020-07-28: Public disclosure of vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
References:
[1] Product Website for Lexmark MX711de MFP
https://www.lexmark.com/en_us/printer/7744/Lexmark-MX711de
[2] SySS Security Advisory SYSS-2020-002
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-002.txt
[3] SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/
[4] PRET - Printer Exploitation Toolkit
https://github.com/RUB-NDS/PRET
[5] Lexmark Security Advisory
http://support.lexmark.com/index?page=content&id=TE940&locale=EN&userlocale=EN_US
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Credits:
This security vulnerability was found by Daniel Reutter of SySS GmbH.
E-Mail: daniel.reutter@syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Daniel_Reutter.asc
Key ID: 0xD571C92FC7054703
Key Fingerprint: 0C7F 36C4 68D1 AF5A 9100 AFB1 D571 C92F C705 4703
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclaimer:
The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Copyright:
Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en
-----BEGIN PGP SIGNATURE-----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=7DG0
-----END PGP SIGNATURE-----