HP LaserJet PJL Interface Directory Traversal (HPSBPI02575)

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

The remote host is affected by a traversal vulnerability.

Description :

The remote host's PJL interface fails to sanitize input to the 'name'
parameter of the 'fsdirlist' command before using it.

An attacker can leverage this issue using a directory traversal
sequence to view arbitrary files on the affected host within the
context of the PJL service. Information harvested may aid in launching
further attacks.

See also :


Solution :

Set a PJL password or disable file system access via the PJL

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.3
Public Exploit Available : true

Family: General

Nessus Plugin ID: 69480 ()

Bugtraq ID: 44882

CVE ID: CVE-2010-4107

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now