cve-2024-36249
Vulnerability from cvelistv5
Published
2024-11-26 07:38
Modified
2024-11-26 14:09
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in Sharp Corporation and Toshiba Tech Corporation multiple MFPs (multifunction printers). If this vulnerability is exploited, an arbitrary script may be executed on the administrative page of the affected MFPs. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Multiple MFPs (multifunction printers) |
Version: See the information provided by Sharp Corporation listed under [References] |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36249", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T14:03:17.536595Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:09:24.516Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Multiple MFPs (multifunction printers)", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "See the information provided by Sharp Corporation listed under [References]" } ] }, { "product": "Multiple MFPs (multifunction printers)", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "See the information provided by Toshiba Tec Corporation listed under [References]" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in Sharp Corporation and Toshiba Tech Corporation multiple MFPs (multifunction printers). If this vulnerability is exploited, an arbitrary script may be executed on the administrative page of the affected MFPs. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T07:38:18.359Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://global.sharp/products/copier/info/info_security_2024-05.html" }, { "url": "https://jp.sharp/business/print/information/info_security_2024-05.html" }, { "url": "https://www.toshibatec.com/information/20240531_02.html" }, { "url": "https://www.toshibatec.co.jp/information/20240531_02.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93051062/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-36249", "datePublished": "2024-11-26T07:38:18.359Z", "dateReserved": "2024-05-22T09:00:09.251Z", "dateUpdated": "2024-11-26T14:09:24.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-36249\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-11-26T08:15:06.580\",\"lastModified\":\"2024-11-26T08:15:06.580\",\"vulnStatus\":\"Received\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting vulnerability exists in Sharp Corporation and Toshiba Tech Corporation multiple MFPs (multifunction printers). If this vulnerability is exploited, an arbitrary script may be executed on the administrative page of the affected MFPs. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de cross-site scripting en varias impresoras multifunci\u00f3n de Sharp Corporation y Toshiba Tech Corporation. Si se explota esta vulnerabilidad, se puede ejecutar una secuencia de comandos arbitraria en la p\u00e1gina administrativa de las impresoras multifunci\u00f3n afectadas. En cuanto a los detalles de los nombres de los productos afectados, los n\u00fameros de modelo y las versiones, consulte la informaci\u00f3n proporcionada por los respectivos proveedores que se enumeran en [Referencias].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://global.sharp/products/copier/info/info_security_2024-05.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jp.sharp/business/print/information/info_security_2024-05.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jvn.jp/en/vu/JVNVU93051062/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.toshibatec.co.jp/information/20240531_02.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.toshibatec.com/information/20240531_02.html\",\"source\":\"vultures@jpcert.or.jp\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.