This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote host is affected by a traversal vulnerability.
The remote host's PJL interface fails to sanitize input to the 'name'
parameter of the 'fsdirlist' command before using it.
An attacker can leverage this issue using a directory traversal
sequence to view arbitrary files on the affected host within the
context of the PJL service. Information harvested may aid in launching
See also :
Set a PJL password or disable file system access via the PJL
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true