CVE-2024-55925

Plain English Summary

AI-powered analysis for quick understanding

An attacker can gain unauthorized access to sensitive API endpoints in Xerox Workplace Suite by tricking the system into accepting a fake Host header. This vulnerability occurs if the server doesn't properly check the Host header, allowing the attacker to bypass restrictions meant to limit access to specific hosts.

Technical Description

In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References