CVE-2024-55925
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain unauthorized access to sensitive API endpoints in Xerox Workplace Suite by tricking the system into accepting a fake Host header. This vulnerability occurs if the server doesn't properly check the Host header, allowing the attacker to bypass restrictions meant to limit access to specific hosts.
Technical Description
In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jan 23, 2025
about 1 year ago
Last Modified
Feb 28, 2026
about 1 month ago
Vendor
xerox
Product
workplace suite
Related Vulnerabilities
This vulnerability allows an attacker to trick the Xerox FreeFlow Core software into making unauthorized requests to other servers, potentially exposing sensitive information or services. It affects versions up to 8.0.7, so it's important to upgrade to version 8.1.0 to protect against this risk.
This vulnerability allows an attacker to access unauthorized files on the system, potentially leading to remote code execution, which means they could run malicious software on the affected Xerox FreeFlow Core software. It affects versions up to 8.0.7, so upgrading to version 8.1.0 is crucial to protect against this risk.