关联漏洞
Description
This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.
介绍
# PoC for CVE-2023-22960
[](https://www.python.org/)
<img src="https://img.shields.io/badge/Developed%20on-kali%20linux-blueviolet">
[](https://github.com/t3l3machus/CVE-2023-22960/blob/main/LICENSE)
## Details
PoC for CVE-2023-22960 that I discovered. This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server interface of all Lexmark printer models that have a firmware version released before 01/2023. This issue affects both username-password and PIN authentication.
**Official security advisory** -> https://publications.lexmark.com/publications/security-alerts/CVE-2023-22960.pdf
**PoC tested against**:
- Lexmark MX622adhe
- Lexmark CX735adse
- Lexmark MX521ade
#### Video Presentation
In this video I demonstrate the issue as well as how to write an http(s) login bruteforce script with Python.
https://www.youtube.com/watch?v=HuAqTScr_3s
## Preview
Without the brute-force prevention bypass:

Applying the brute-force prevention bypass:

文件快照
[4.0K] /data/pocs/4f8d3df2eec4673bb1983614b8715198c0eb714d
├── [3.6K] lexmark-brute-force-login.py
├── [3.1K] lexmark-brute-force-pins.py
├── [1.1K] LICENSE
└── [1.4K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →