Submit #493666: Konica Minolta Web Connection bizhub C368 Cross-Site Request Forgeryinfo

TitleKonica Minolta Web Connection bizhub C368 Cross-Site Request Forgery
DescriptionA unprotected page for authentication can leads to trigger cross site scripting. Attack vector(s) 1. Once the attacker finds the unprotected printer page, navigate to "Box" option found on home page. 2. Click on "User Box List" and register a box. 3. It will show under "User Box list", there click on delete, it will ask for the confirmation, click "ok" and intercept the request then drop it after making csrf POC. 4. Now open the CSRF poc file and trigger the request, it can be seen that the Box has been deleted.
Source⚠️ https://drive.google.com/file/d/1pECiiSWdB_ERzzGrc--WY63IzZxR6i6L/view
User
 Upasana (UID 12274)
Submission02/02/2025 10:36 AM (1 Year ago)
Moderation06/09/2025 07:47 AM (4 months later)
StatusAccepted
VulDB entry311656 [Konica Minolta bizhub up to 20250202 cross-site request forgery]
Points20

Interested in the pricing of exploits?

See the underground prices here!