VAR-201403-0045

Vulnerability from variot - Updated: 2023-12-18 12:38

Cross-site scripting (XSS) vulnerability in the Brother MFC-9970CDW printer with firmware G (1.03) and L (1.10) allows remote attackers to inject arbitrary web script or HTML via an arbitrary parameter name (QUERY_STRING) to admin/admin_main.html, a different vulnerability than CVE-2013-2507 and CVE-2013-2671. The Brother MFC-9970CDW is a color laser printer device that supports wireless network printing. The /admin/admin_main.html script included with the Brother MFC-9970CDW incorrectly filters data submitted by users to the 'signedpdf' and 'websettings' parameters, allowing remote attackers to exploit vulnerabilities for cross-site scripting attacks, to obtain sensitive information or to hijack user sessions. A remote attacker can exploit a vulnerability to gain sensitive information or hijack a user's session. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Brother MFC-9970CDW version 1.10 firmware G and firmware L are vulnerable; other versions may also be affected. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

=========================================

Brother MFC-9970CDW Firmware 0D

Date: Jan. 13, 2013

URL: http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html

=========================================

Keywords

=========================================

XSS, Cross Site Scripting, CWE-79, CAPEC-86, Javascript Injection, Exploit, Zero Day, Brother MFC-9970 CDW

CVE-2013-2507, CVE-2013-2670, CVE-2013-2671, CVE-2013-2672, CVE-2013-2673, CVE-2013-2674, CVE-2013-2675, CVE-2013-2676

=========================================

Summary

=========================================

A Reflected XSS Bug in the Brother MFC-9970CDW Printer was discovered in January 2013. This document will introduce and discuss the vulnerability and provide Proof-of-Concept (PoC) Zero Day (0D) code examples for Firmware L Version 1.10 Released on July 9, 2012, and prior versions.

=========================================

Overview

=========================================

Brother Industries, Ltd. is a multinational electronics and electrical equipment company headquartered in Nagoya, Japan. Its products include printers, multifunction printers, sewing machines, large machine tools, label printers, typewriters, fax machines, and other computer-related electronics. Brother distributes its products both under its own name and under OEM agreements with other companies. It produces high-impact color output at impressive print and copy speeds of up to 30ppm and offers flexible connectivity with wireless, Ethernet and USB interfaces. It features a 5" Color Touch Screen display for easy navigation and menu selection. Also, this flagship model offers automatic duplex print/copy/scan/fax and optional high yield toner cartridges to help lower your operating costs \x96 making this all-in-one a smart choice for a business or workgroup.

=========================================

The Bug

=========================================

Reflected Cross Site Scripting, CWE-79

=========================================

Vulnerable Parameters = id , val, kind + Query String

Signature = ">alert(1)

=========================================

Version Identification

=========================================

Brother MFC-9970CDW - Version Identification - Firmware \x93L\x94 Version 1.10

Brother MFC-9970CDW - Version Identification - Firmware \x93G\x94

=========================================

PoC

=========================================

PoC URL

http://my.vulnerable.printer/admin/admin_main.html?id=websettings"> alert(1)

=========================================

CVE Information

=========================================

CVE-2013-2507 is specific to Firmware G.

XSS at:

admin/admin_main.html name of an arbitrarily assigned URL parameter

CVE-2013-2671 is for the XSS issues that are only present in Firmware L.

CVEs for Firmware L:

Cleartext submission of password CVE-2013-2672

Password field with autocomplete enabled CVE-2013-2673

Cross-domain Referer leakage CVE-2013-2674

Frameable response (Clickjacking) CVE-2013-2675

Private IP addresses disclosed CVE-2013-2676

CVSS 2 Score = 4.5

Timeline

Attempt contact via e-mail in January 2013.

Call the Toll Free Support Line in March 2013.

Callback from Vendor in April 2013.

E-mail sent to Vendor in April 2013.

VENDOR UNRESPONSIVE

Published May 3, 2013

Hoyt LLC Research Public Domain Report

http://xss.cx/

=========================================

END

=========================================

-----BEGIN PGP SIGNATURE----- Version: 10.2.0.2526

wsBVAwUBUYkKz3z+WcLIygj0AQiVegf/VFskxkdQkqUcqzKXHbTvnHLkkTA8fSgx 1orNQQwxahmpX2f5Jce4zuUz2g+35McwWCKR4kMnOio/9FnWl/w+zqiwmzFqfuHv AIQAD0XXP+vKY/vSF0Bjtg9bUVlkNC4ilmyYVwWS9ycM0HOff3nwXxaZmpkr1Ibb 4Bn4ZeILFYaZYYfj3kM4JSsIuI+gisGmTDg6jMYfZhFDIps5nXeq2vDm34E7Sgx8 nSEOiS9FIq7YSh+ZIWCJE3Olcsx0DUiZuZXVIR4pT8mubB0f6Fx6wOVNQyiT5qNG VQNG1QARkNQFxxuSZD11NtO8mszE+sC8ZBP4VfRjkvJ3c8DecyB5Mg== =Ua1o -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0045",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mfc-9970cdw",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "brother",
        "version": "g\\(1.03\\)"
      },
      {
        "model": "mfc-9970cdw",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "brother",
        "version": "l\\(1.10\\)"
      },
      {
        "model": "mfc-9970cdw",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brother",
        "version": null
      },
      {
        "model": "mfc-9970cdw l",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "brother",
        "version": "1.10"
      },
      {
        "model": "mfc-9970cdw",
        "scope": null,
        "trust": 0.8,
        "vendor": "brother industry",
        "version": null
      },
      {
        "model": "mfc-9970cdw",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "brother industry",
        "version": "g (1.03)"
      },
      {
        "model": "mfc-9970cdw",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "brother industry",
        "version": "l (1.10)"
      },
      {
        "model": "mfc-9970cdw g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "brother",
        "version": "1.10"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "BID",
        "id": "59720"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:brother:mfc-9970cdw_firmware:l\\(1.10\\):*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:brother:mfc-9970cdw_firmware:g\\(1.03\\):*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:brother:mfc-9970cdw:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hoyt LLC",
    "sources": [
      {
        "db": "BID",
        "id": "59720"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-2670",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2013-2670",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-05291",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-62672",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-2670",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-05291",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201305-203",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-62672",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in the Brother MFC-9970CDW printer with firmware G (1.03) and L (1.10) allows remote attackers to inject arbitrary web script or HTML via an arbitrary parameter name (QUERY_STRING) to admin/admin_main.html, a different vulnerability than CVE-2013-2507 and CVE-2013-2671. The Brother MFC-9970CDW is a color laser printer device that supports wireless network printing. The /admin/admin_main.html script included with the Brother MFC-9970CDW incorrectly filters data submitted by users to the \u0027signedpdf\u0027 and \u0027websettings\u0027 parameters, allowing remote attackers to exploit vulnerabilities for cross-site scripting attacks, to obtain sensitive information or to hijack user sessions. A remote attacker can exploit a vulnerability to gain sensitive information or hijack a user\u0027s session. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nBrother MFC-9970CDW version 1.10 firmware G and firmware L are vulnerable; other versions may also be affected. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=========================================\n\nBrother MFC-9970CDW Firmware 0D\n\nDate: Jan. 13, 2013\n\nURL:\nhttp://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html\n\n=========================================\n\nKeywords\n\n=========================================\n\nXSS, Cross Site Scripting, CWE-79, CAPEC-86, Javascript Injection, Exploit,\nZero Day, Brother MFC-9970 CDW\n\nCVE-2013-2507, CVE-2013-2670, CVE-2013-2671, CVE-2013-2672, CVE-2013-2673,\nCVE-2013-2674, CVE-2013-2675, CVE-2013-2676\n\n=========================================\n\nSummary\n\n=========================================\n\nA Reflected XSS Bug in the Brother MFC-9970CDW Printer was discovered in\nJanuary 2013. This document will introduce and discuss the vulnerability\nand provide Proof-of-Concept (PoC) Zero Day (0D) code examples for Firmware\nL Version 1.10 Released on July 9, 2012, and prior versions. \n\n=========================================\n\nOverview\n\n=========================================\n\nBrother Industries, Ltd. is a multinational electronics and electrical\nequipment company headquartered in Nagoya, Japan. Its products include\nprinters, multifunction printers, sewing machines, large machine tools,\nlabel printers, typewriters, fax machines, and other computer-related\nelectronics. Brother distributes its products both under its own name and\nunder OEM agreements with other companies. It produces high-impact color output at impressive\nprint and copy speeds of up to 30ppm and offers flexible connectivity with\nwireless, Ethernet and USB interfaces. It features a 5\" Color Touch Screen\ndisplay for easy navigation and menu selection. Also, this flagship model\noffers automatic duplex print/copy/scan/fax and optional high yield toner\ncartridges to help lower your operating costs \\x96 making this all-in-one a\nsmart choice for a business or workgroup. \n\n=========================================\n\nThe Bug\n\n=========================================\n\nReflected Cross Site Scripting, CWE-79\n\n=========================================\n\nVulnerable Parameters = id , val, kind + Query String\n\nSignature = \"\u003e\u003cscript\u003ealert(1)\u003c/script\u003e\n\n=========================================\n\nVersion Identification\n\n=========================================\n\nBrother MFC-9970CDW - Version Identification - Firmware \\x93L\\x94 Version\n1.10\n\nBrother MFC-9970CDW - Version Identification - Firmware \\x93G\\x94\n\n=========================================\n\nPoC\n\n=========================================\n\nPoC URL\n\nhttp://my.vulnerable.printer/admin/admin_main.html?id=websettings\"\u003e\u003cscript\u003e\nalert(1)\u003c/script\u003e\n\n=========================================\n\nCVE Information\n\n=========================================\n\nCVE-2013-2507 is specific to Firmware G. \n\nXSS at:\n\n  admin/admin_main.html  name of an arbitrarily assigned URL parameter\n\nCVE-2013-2671 is for the XSS issues that are only present in Firmware L. \n\nCVEs for Firmware L:\n\nCleartext submission of password CVE-2013-2672\n\nPassword field with autocomplete enabled CVE-2013-2673\n\nCross-domain Referer leakage CVE-2013-2674\n\nFrameable response (Clickjacking) CVE-2013-2675\n\nPrivate IP addresses disclosed CVE-2013-2676\n\nCVSS 2 Score = 4.5\n\nTimeline\n\nAttempt contact via e-mail in January 2013. \n\nCall the Toll Free Support Line in March 2013. \n\nCallback from Vendor in April 2013. \n\nE-mail sent to Vendor in April 2013. \n\nVENDOR UNRESPONSIVE\n\nPublished May 3, 2013\n\nHoyt LLC Research                                        Public Domain\nReport\n\nhttp://xss.cx/\n\n=========================================\n\nEND\n\n=========================================\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: 10.2.0.2526\n\nwsBVAwUBUYkKz3z+WcLIygj0AQiVegf/VFskxkdQkqUcqzKXHbTvnHLkkTA8fSgx\n1orNQQwxahmpX2f5Jce4zuUz2g+35McwWCKR4kMnOio/9FnWl/w+zqiwmzFqfuHv\nAIQAD0XXP+vKY/vSF0Bjtg9bUVlkNC4ilmyYVwWS9ycM0HOff3nwXxaZmpkr1Ibb\n4Bn4ZeILFYaZYYfj3kM4JSsIuI+gisGmTDg6jMYfZhFDIps5nXeq2vDm34E7Sgx8\nnSEOiS9FIq7YSh+ZIWCJE3Olcsx0DUiZuZXVIR4pT8mubB0f6Fx6wOVNQyiT5qNG\nVQNG1QARkNQFxxuSZD11NtO8mszE+sC8ZBP4VfRjkvJ3c8DecyB5Mg==\n=Ua1o\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "BID",
        "id": "59720"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "db": "PACKETSTORM",
        "id": "121553"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-2670",
        "trust": 3.5
      },
      {
        "db": "PACKETSTORM",
        "id": "121553",
        "trust": 2.6
      },
      {
        "db": "OSVDB",
        "id": "93068",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "59720",
        "trust": 1.6
      },
      {
        "db": "XF",
        "id": "84095",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "9970",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "db": "BID",
        "id": "59720"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "PACKETSTORM",
        "id": "121553"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "id": "VAR-201403-0045",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      }
    ],
    "trust": 1.3129032399999998
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:38:34.238000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.brother.com"
      },
      {
        "title": "MFC-9970CDW",
        "trust": 0.8,
        "url": "http://brother.jp/product/printer/mfc/mfc9970cdw/index.htm"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html"
      },
      {
        "trust": 2.5,
        "url": "http://packetstormsecurity.com/files/121553/brother-mfc-9970cdw-firmware-0d-cross-site-scripting.html"
      },
      {
        "trust": 2.5,
        "url": "http://osvdb.org/93068"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/ref/93/brother-mfc-9970cdw-firmware-g-v103-by-hoyt-03072013.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/ref/93/brother-mfc9970cdw-firmware-l-110-hoytllc-report.html"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/84095"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84095"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2670"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2670"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/59720"
      },
      {
        "trust": 0.3,
        "url": "http://www.brother.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.brother-usa.com/mfc/modeldetail/4/mfc9970cdw/overview#.uyobsuqdyit"
      },
      {
        "trust": 0.1,
        "url": "http://my.vulnerable.printer/admin/admin_main.html?id=websettings\"\u003e\u003cscript\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://xss.cx/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2507"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2671"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2674"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2670"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2676"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2672"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2675"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2673"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "db": "BID",
        "id": "59720"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "PACKETSTORM",
        "id": "121553"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "db": "BID",
        "id": "59720"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "db": "PACKETSTORM",
        "id": "121553"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "date": "2014-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "date": "2013-05-06T00:00:00",
        "db": "BID",
        "id": "59720"
      },
      {
        "date": "2014-03-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "date": "2013-05-08T02:27:54",
        "db": "PACKETSTORM",
        "id": "121553"
      },
      {
        "date": "2014-03-14T14:55:04.280000",
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "date": "2013-05-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-05291"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62672"
      },
      {
        "date": "2013-05-06T00:00:00",
        "db": "BID",
        "id": "59720"
      },
      {
        "date": "2014-03-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      },
      {
        "date": "2017-08-29T01:33:16.463000",
        "db": "NVD",
        "id": "CVE-2013-2670"
      },
      {
        "date": "2014-03-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Brother MFC-9970CDW Cross-site scripting vulnerability in printer firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006193"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "121553"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-203"
      }
    ],
    "trust": 0.7
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…