First published: Tue Aug 28 2018(Updated: )
RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ricoh MP C4504ex Firmware | ||
Ricoh MP C4504ex Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-15884.
The title of this vulnerability is RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
This vulnerability can be exploited by performing HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
The severity of CVE-2018-15884 is high with a CVSS score of 8.8.
Yes, there are known exploits for this vulnerability. You can find them at the following references: http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html and https://www.exploit-db.com/exploits/45264/