SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Printer)  >   JetDirect Vendors:   HPE
HP JetDirect Printers Let Remote Users Traverse the Directory
SecurityTracker Alert ID:  1021687
SecurityTracker URL:  http://securitytracker.com/id/1021687
CVE Reference:   CVE-2008-4419   (Links to External Site)
Updated:  Apr 13 2010
Original Entry Date:  Feb 5 2009
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in HP JetDirect printers. A remote user can view files on the target system.

A remote user can supply a specially crafted request to view files on target system that are located outside of the document directory, including system configuration files and cached documents.

Certain HP LaserJet printers, HP Color LaserJet printers and HP Digital Senders are affected.

The following products are affected:

HP LaserJet 2410 with firmware prior to 20080819 SPCL112A
HP LaserJet 2420 with firmware prior to 20080819 SPCL112A
HP LaserJet 2430 with firmware prior to 20080819 SPCL112A
HP LaserJet P3005 with firmware prior to 02.043.1
HP LaserJet P3015 with firmware prior to 06.043.2
HP LaserJet P4015 with firmware prior to 04.049.0
HP Color LaserJet CP4025 with firmware prior to 07.20.7
HP Color LaserJet CP4525 with firmware prior to 07.20.7
HP LaserJet 4250 with firmware prior to 08.160.4
HP LaserJet 4350 with firmware prior to 08.160.4
HP LaserJet 5200 with firmware prior to 08.062.0
HP Color LaserJet 5550 with firmware prior to 7.014.0
HP LaserJet 9040 with firmware prior to 08.112.0
HP LaserJet 9050 with firmware prior to 08.112.0
HP LaserJet 4345mfp with firmware prior to 09.120.9
HP Color LaserJet 4730mfp with firmware prior to 46.200.9
HP LaserJet 9040mfp with firmware prior to 08.110.9
HP LaserJet 9050mfp with firmware prior to 08.110.9
HP 9200C Digital Sender with firmware prior to 09.120.9
HP 9250 Digital Sender with firmware prior to 48.091.3
HP Color LaserJet 9500mfp with firmware prior to 08.110.9

Shmoov and r@b13$ from Digital Defense, Inc. reported this vulnerability.

Impact:   A remote user can view files on the target system.
Solution:   The vendor has issued fixes.

A patch matrix is available in the vendor's advisory.

The vendor's advisory is available at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905

Vendor URL:  h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal

Title
-----
DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal

Severity
--------
High

Date Discovered
---------------
October 23, 2008

Discovered By
-------------
Digital Defense, Inc. Vulnerability Research Team
Credit: Shmoov and r@b13$

Vulnerability Description
-------------------------
The HP-ChaiSOE/1.0 embedded web server on certain HP JetDirect printers allows a potential attacker to gain read only access to directories
 and files outside of the web root.  An attacker can leverage this flaw to read arbitrary system configuration files, cached documents,
 etc. Information obtained from an affected host may facilitate further attacks against the host.  Exploitation of this flaw is trivial
 using common web server directory traversal techniques.

Solution Description
--------------------
The vendor has released an update.  See http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905 for more
 details.
Digital Defense, Inc. recommends restricting access to the HP JetDirect web administration interface to authorized hosts only.

Tested Systems / Software (with versions)
------------------------------------------
Embedded web server HP-ChaiSOE/1.0 on:
	HP JetDirect 2420
	HP JetDirect 4250


Vendor Contact
--------------
HP
http://www.hp.com

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC