HP LaserJet Web Server Unspecified Admin Component Traversal Arbitrary File Access

high Nessus Plugin ID 36129
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote web server is affected by a directory traversal vulnerability.


The remote web server is an embedded web server for an HP LaserJet printer. The version of the firmware reported by the printer is reportedly affected by a directory traversal vulnerability. Because the printer caches printed files, an attacker could exploit this in order to gain access to sensitive information.


Upgrade the firmware according to the vendor's advisory.

See Also






Plugin Details

Severity: High

ID: 36129

File Name: hp_laserjet_directory_traversal.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 4/10/2009

Updated: 1/26/2022

Dependencies: hp_laserjet_detect.nasl

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/h:hp:laserjet

Required KB Items: www/hp_laserjet/pname, www/hp_laserjet/fw, www/hp_laserjet/port

Exploit Ease: No known exploits are available

Patch Publication Date: 2/4/2009

Vulnerability Publication Date: 2/4/2009

Reference Information

CVE: CVE-2008-4419

BID: 33611

IAVT: 2009-T-0010-S

CWE: 22