# Brother等多品牌信息泄露漏洞
## 漏洞概述
未认证的攻击者可以通过访问HTTP服务(TCP端口80)、HTTPS服务(TCP端口443)或IPP服务(TCP端口631)从存在漏洞的设备中获取敏感信息。通过发送GET请求访问URI路径`/etc/mnt_info.csv`,无需认证即可泄露设备敏感信息。
## 影响版本
未提供具体受影响的版本信息。
## 细节
攻击者可以通过GET请求访问路径`/etc/mnt_info.csv`从而获取敏感信息。该信息以CSV格式返回,包含设备的型号、固件版本、IP地址和序列号。
## 影响
敏感信息泄露可能导致设备被进一步利用,包括但不限于目标定位、固件版本分析以及潜在的设备指纹识别等安全威胁。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-51977.yaml | POC详情 |
2 | Multiple Brother Devices: Multiple Vulnerabilities (CVE-2024-51977, CVE-2024-51978, CVE-2024-51979, CVE-2024-51980, CVE-2024-51981, CVE-2024-51982, CVE-2024-51983, CVE-2024-51984) | https://github.com/sfewer-r7/BrotherVulnerabilities | POC详情 |
标题: Notice on Vulnerabilities in FUJIFILM Multifunction Devices and Printers : FUJIFILM Business Innovation Corp. -- 🔗来源链接
标签: vendor-advisory
神龙速读标题: Response to vulnerability in some Toshiba Tec's digital multi-function peripherals -- 🔗来源链接
标签: vendor-advisory
神龙速读标题: Multiple Brother Devices: Multiple Vulnerabilities (FIXED) - Rapid7 Blog -- 🔗来源链接
标签: third-party-advisory
神龙速读标题: GitHub - sfewer-r7/BrotherVulnerabilities: Multiple Brother Devices: Multiple Vulnerabilities (CVE-2024-51977, CVE-2024-51978, CVE-2024-51979, CVE-2024-51980, CVE-2024-51981, CVE-2024-51982, CVE-2024-51983, CVE-2024-51984) -- 🔗来源链接
标签: exploit
神龙速读标题: nuclei-templates/http/cves/2024/CVE-2024-51977.yaml at main · projectdiscovery/nuclei-templates · GitHub -- 🔗来源链接
标签: exploit
神龙速读暂无评论