HP JetDirect Web Administration Directory Traversal

2009.02.07
Credit: ddifrontline
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 7.8/10
Impact Subscore: 6.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: None
Availability impact: None

Title ----- DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal Severity -------- High Date Discovered --------------- October 23, 2008 Discovered By ------------- Digital Defense, Inc. Vulnerability Research Team Credit: Shmoov and r@b13$ Vulnerability Description ------------------------- The HP-ChaiSOE/1.0 embedded web server on certain HP JetDirect printers allows a potential attacker to gain read only access to directories and files outside of the web root. An attacker can leverage this flaw to read arbitrary system configuration files, cached documents, etc. Information obtained from an affected host may facilitate further attacks against the host. Exploitation of this flaw is trivial using common web server directory traversal techniques. Solution Description -------------------- The vendor has released an update. See http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c 01623905 for more details. Digital Defense, Inc. recommends restricting access to the HP JetDirect web administration interface to authorized hosts only. Tested Systems / Software (with versions) ------------------------------------------ Embedded web server HP-ChaiSOE/1.0 on: HP JetDirect 2420 HP JetDirect 4250 Vendor Contact -------------- HP http://www.hp.com

References:

http://www.securityfocus.com/archive/1/archive/1/500657/100/0/threaded
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top