HP LaserJet PJL Interface Directory Traversal (HPSBPI02575)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a traversal vulnerability.

Description :

The remote host's PJL interface fails to sanitize input to the 'name'
parameter of the 'fsdirlist' command before using it.

An attacker can leverage this issue using a directory traversal
sequence to view arbitrary files on the affected host within the
context of the PJL service. Information harvested may aid in launching
further attacks.

See also :

http://www.nessus.org/u?75a7707f
http://www.nessus.org/u?2dce2a0f

Solution :

Set a PJL password or disable file system access via the PJL
interface.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: General

Nessus Plugin ID: 69480 ()

Bugtraq ID: 44882

CVE ID: CVE-2010-4107