CVE-2006-5290

Current Description

The ESS/ Network Controller and MicroServer Web Server components of Xerox WorkCentre and WorkCentre Pro 232, 238, 245, 255, 265 and 275 allow remote attackers to bypass authentication and execute arbitrary code via "WebUI command injection on TCP/IP hostname."

Referenced by CVEs:CVE-2006-6427

Basic Data

PublishedOctober 13, 2006
Last ModifiedJuly 20, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3HardwareXeroxWorkcentre 232********
    2.3HardwareXeroxWorkcentre 232**pro*****
    2.3HardwareXeroxWorkcentre 238********
    2.3HardwareXeroxWorkcentre 238**pro*****
    2.3HardwareXeroxWorkcentre 245********
    2.3HardwareXeroxWorkcentre 245**pro*****
    2.3HardwareXeroxWorkcentre 255********
    2.3HardwareXeroxWorkcentre 255**pro*****
    2.3HardwareXeroxWorkcentre 265********
    2.3HardwareXeroxWorkcentre 265**pro*****
    2.3HardwareXeroxWorkcentre 275********
    2.3HardwareXeroxWorkcentre 275**pro*****

Vulnerable Software List

VendorProductVersions
Xerox Workcentre 232 *
Xerox Workcentre 238 *
Xerox Workcentre 245 *
Xerox Workcentre 255 *
Xerox Workcentre 265 *
Xerox Workcentre 275 *

References

NameSourceURLTags
22252http://secunia.com/advisories/22252SECUNIAPatch Vendor Advisory
1016981http://securitytracker.com/id?1016981SECTRACK
20334http://www.securityfocus.com/bid/20334/infoBIDPatch
ADV-2006-3921http://www.vupen.com/english/advisories/2006/3921VUPEN
http://www.xerox.com/downloads/usa/en/c/cert_XRX06_005.pdfhttp://www.xerox.com/downloads/usa/en/c/cert_XRX06_005.pdfCONFIRMPatch
xerox-hostname-command-execution(29357)https://exchange.xforce.ibmcloud.com/vulnerabilities/29357XF