mfp-unauth-exposure: Multi-function Printer - Unauthorized Access

日期: 2025-08-01 | 影响软件: Multi-function Printer | POC: 已公开

漏洞描述

Unauthorized access to MFP (Multi-function printer) using eSCL protocol allows attackers to scan documents left physically in the printer and send them to an arbitrary location. Furthermore, exposure of this endpoint allows attackers to gather information about the printer, serial number, model, and possibly pull documents scanned by legitimate users.

PoC代码[已公开]

id: mfp-unauth-exposure

info:
  name: Multi-function Printer - Unauthorized Access
  author: matejsmycka
  severity: medium
  description: |
    Unauthorized access to MFP (Multi-function printer) using eSCL protocol allows attackers to scan documents left physically in the printer and send them to an arbitrary location. Furthermore, exposure of this endpoint allows attackers to gather information about the printer, serial number, model, and possibly pull documents scanned by legitimate users.
  reference:
    - https://wiki.debian.org/eSCL
    - https://support.princh.com/en/the-onboarding-process-1
    - https://mopria.org/spec-download
    - https://github.com/xJonathanLEI/escl-rs
  metadata:
    max-request: 1
    verified: true
  tags: network,iot,printer,misconfig,escl,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/eSCL/ScannerCapabilities"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "xmlns:pwg="
          - "<scan:ScannerCapabilities"
        condition: and

      - type: word
        part: header
        words:
          - "application/xml"
          - "text/xml"
        condition: or

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        group: 1
        regex:
          - '<(?:pwg:)?SerialNumber>([^<]+)</(?:pwg:)?SerialNumber>'
          - '<(?:pwg:)?Model>([^<]+)</(?:pwg:)?Model>'
          - '<(?:pwg:)?MakeAndModel>([^<]+)</(?:pwg:)?MakeAndModel>'
# digest: 4b0a00483046022100f6798c80fcb058cae61ead76e0c647380af9ed31a918952732e075b2c32179aa022100f8b9372feffbdb530507473814ef619a323735b20c39f1f927b7a61474573895:922c64590222798bb761d5b6d8e72950

相关漏洞推荐