VAR-200902-0673
Vulnerability from variot - Updated: 2023-12-18 13:15Directory traversal vulnerability in the HP JetDirect web administration interface in the HP-ChaiSOE 1.0 embedded web server on the LaserJet 9040mfp, LaserJet 9050mfp, and Color LaserJet 9500mfp before firmware 08.110.9; LaserJet 4345mfp and 9200C Digital Sender before firmware 09.120.9; Color LaserJet 4730mfp before firmware 46.200.9; LaserJet 2410, LaserJet 2420, and LaserJet 2430 before firmware 20080819 SPCL112A; LaserJet 4250 and LaserJet 4350 before firmware 20080819 SPCL015A; and LaserJet 9040 and LaserJet 9050 before firmware 20080819 SPCL110A allows remote attackers to read arbitrary files via directory traversal sequences in the URI. Multiple HP printers are prone to an unspecified directory-traversal vulnerability because the device's webserver fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks.
The vulnerability is caused due to an input validation error within the embedded web server, which can be exploited to gain access to files outside the web root via directory traversal attacks. Vulnerability Research Team
ORIGINAL ADVISORY: HPSBPI02398 SSRT080166: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01623905 Version: 1
HPSBPI02398 SSRT080166 rev.1 - Certain HP LaserJet Printers, HP Color LaserJet Printers, and HP Digital Senders, Remote Unauthorized Access to Files
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability could be exploited remotely to gain unauthorized access to files.
References: CVE-2008-4419
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
The Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com.
RESOLUTION
HP has provided firmware updates and preliminary firmware updates to resolve this vulnerability. The firmware updates and preliminary firmware updates are available as described below.
Note: Each firmware update has instructions for finding the firmware version installed on the product.
File - lj24x0fw_08_112_spcl112A.rfu MD5 Sum - b3dbcc8d6d465b0a264b662b13a19685
File - lj4x50fw_08_015_spcl015A.rfu MD5 Sum - 1acfd981cad26e002f655332b1ba5954
File - lj9050-50fw_08_110_spcl110A.rfu MD5 Sum - ed2ded960ba70e563b58e506fbe1faae
File - InstallationInstructions.rtf MD5 Sum - 1feb8410771d698ea9599d2fcc462a2d
Install the preliminary firmware update as described in the InstallationInstructions.rtf file.
PRODUCT SPECIFIC INFORMATION None
HISTORY Version:1 (rev.1) - 4 February 2009 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
\xa9Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 8.1
iQA/AwUBSYmjW+AfOvwtKn1ZEQJvsQCgpPvSzv5fsmj0X5VKefFVqoVNDA4Anjjo 4sKcDkXGzBXY6VTVHHBnLQ6d =GiEL -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200902-0673",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "color laserjet 9500mfp",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20070719_05.011.2"
},
{
"model": "laserjet 2410",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20070410_08.112.3"
},
{
"model": "laserjet 2420",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20070410_08.112.3"
},
{
"model": "laserjet 4345mfp",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20081211_09.131.1"
},
{
"model": "laserjet 2430",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20070410_08.112.3"
},
{
"model": "9200c digital sender",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20081211_09.131.1"
},
{
"model": "laserjet 4250",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20080319_08.015.0"
},
{
"model": "laserjet 4350",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20080319_08.015.0"
},
{
"model": "laserjet 9040",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "laserjet 9050mfp",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "laserjet 9040mfp",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "color laserjet 4370mfp",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20081211_46.211.2"
},
{
"model": "laserjet 9050",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "hp 9200c digital sender",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "09.120.9"
},
{
"model": "hp color laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "4730mfp 46.200.9"
},
{
"model": "hp color laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "9500mfp 08.110.9"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "2410 20080819 spcl112a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "2420 20080819 spcl112a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "2430 20080819 spcl112a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "4250 20080819 spcl015a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "4345mfp 09.120.9"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "4350 20080819 spcl015a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "9040 20080819 spcl110a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "9040mfp 08.110.9"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "9050 20080819 spcl110a"
},
{
"model": "hp laserjet",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "9050mfp 08.110.9"
},
{
"model": "laserjet 9050mfp",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "laserjet 4350",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20080319_08.015.0"
},
{
"model": "color laserjet 4370mfp",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20081211_46.211.2"
},
{
"model": "9200c digital sender",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20081211_09.131.1"
},
{
"model": "laserjet 9040",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "color laserjet 9500mfp",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20070719_05.011.2"
},
{
"model": "laserjet 4345mfp",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20081211_09.131.1"
},
{
"model": "laserjet 4250",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20080319_08.015.0"
},
{
"model": "laserjet 9050",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "laserjet 9040mfp",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "20080204_08.110.0"
},
{
"model": "laserjet p4015",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "laserjet p3015",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "laserjet p3005",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "laserjet 9050mpf",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "laserjet mfp",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "90500"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "90500"
},
{
"model": "laserjet 9040mpf",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "90400"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "4350"
},
{
"model": "laserjet 4345mfp",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "laserjet mfp",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "43450"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "42500"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "24300"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "24200"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "24100"
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5200"
},
{
"model": "ds9250c digital sender",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "ds9200c digital sender",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "digital sender 9200c",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "color laserjet cp4525",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "color laserjet cp4025",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "color laserjet 9500mfp",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "color laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5550"
},
{
"model": "color laserjet 4730mfp",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "color laserjet mfp",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "47300"
}
],
"sources": [
{
"db": "BID",
"id": "33611"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_4350:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20080319_08.015.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_9050:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20080204_08.110.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_9050mfp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20080204_08.110.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_9040mfp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20080204_08.110.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_9040:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20080204_08.110.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_2430:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20070410_08.112.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_4250:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20080319_08.015.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:color_laserjet_9500mfp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20070719_05.011.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:9200c_digital_sender:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20081211_09.131.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_2410:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20070410_08.112.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_2420:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20070410_08.112.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:laserjet_4345mfp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20081211_09.131.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:color_laserjet_4370mfp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20081211_46.211.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2008-4419"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Shmoov and rb13$, Digital Defense, Inc. Vulnerability Research Team",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
],
"trust": 0.6
},
"cve": "CVE-2008-4419",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.8,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2008-4419",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2008-4419",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200902-089",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Directory traversal vulnerability in the HP JetDirect web administration interface in the HP-ChaiSOE 1.0 embedded web server on the LaserJet 9040mfp, LaserJet 9050mfp, and Color LaserJet 9500mfp before firmware 08.110.9; LaserJet 4345mfp and 9200C Digital Sender before firmware 09.120.9; Color LaserJet 4730mfp before firmware 46.200.9; LaserJet 2410, LaserJet 2420, and LaserJet 2430 before firmware 20080819 SPCL112A; LaserJet 4250 and LaserJet 4350 before firmware 20080819 SPCL015A; and LaserJet 9040 and LaserJet 9050 before firmware 20080819 SPCL110A allows remote attackers to read arbitrary files via directory traversal sequences in the URI. Multiple HP printers are prone to an unspecified directory-traversal vulnerability because the device\u0027s webserver fails to sufficiently sanitize user-supplied input. \nExploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. \n\nThe vulnerability is caused due to an input validation error within\nthe embedded web server, which can be exploited to gain access to\nfiles outside the web root via directory traversal attacks. Vulnerability Research Team\n\nORIGINAL ADVISORY:\nHPSBPI02398 SSRT080166:\nhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01623905\nVersion: 1\n\nHPSBPI02398 SSRT080166 rev.1 - Certain HP LaserJet Printers, HP Color LaserJet Printers, and HP Digital Senders, Remote Unauthorized Access to Files\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability could be exploited remotely to gain unauthorized access to files. \n\nReferences: CVE-2008-4419 \n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n \nThe Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com. \n\nRESOLUTION\n\nHP has provided firmware updates and preliminary firmware updates to resolve this vulnerability. The firmware updates and preliminary firmware updates are available as described below. \n\nNote: Each firmware update has instructions for finding the firmware version installed on the product. \n \nFile - lj24x0fw_08_112_spcl112A.rfu \nMD5 Sum - b3dbcc8d6d465b0a264b662b13a19685\n \nFile - lj4x50fw_08_015_spcl015A.rfu \nMD5 Sum - 1acfd981cad26e002f655332b1ba5954\n \nFile - lj9050-50fw_08_110_spcl110A.rfu \nMD5 Sum - ed2ded960ba70e563b58e506fbe1faae\n \nFile - InstallationInstructions.rtf \nMD5 Sum - 1feb8410771d698ea9599d2fcc462a2d\n \n\nInstall the preliminary firmware update as described in the InstallationInstructions.rtf file. \n\nPRODUCT SPECIFIC INFORMATION \nNone \n\nHISTORY \nVersion:1 (rev.1) - 4 February 2009 Initial release \n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com \nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com \n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email: \nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC \nOn the web page: ITRC security bulletins and patch sign-up \nUnder Step1: your ITRC security bulletins and patches \n - check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems \n - verify your operating system selections are checked and save. \n\n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php \nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do \n\n\n* The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: \n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n \nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\n\\xa9Copyright 2009 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 8.1\n\niQA/AwUBSYmjW+AfOvwtKn1ZEQJvsQCgpPvSzv5fsmj0X5VKefFVqoVNDA4Anjjo\n4sKcDkXGzBXY6VTVHHBnLQ6d\n=GiEL\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "BID",
"id": "33611"
},
{
"db": "PACKETSTORM",
"id": "74717"
},
{
"db": "PACKETSTORM",
"id": "74745"
},
{
"db": "PACKETSTORM",
"id": "94796"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-4419",
"trust": 2.9
},
{
"db": "BID",
"id": "33611",
"trust": 1.9
},
{
"db": "SECUNIA",
"id": "33779",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2009-0341",
"trust": 1.6
},
{
"db": "SECTRACK",
"id": "1021687",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001354",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20090204 DDIVRT-2008-19 HP JETDIRECT WEB ADMINISTRATION DIRECTORY TRAVERSAL",
"trust": 0.6
},
{
"db": "HP",
"id": "HPSBPI02398",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200902-089",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "74717",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "74745",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "94796",
"trust": 0.1
}
],
"sources": [
{
"db": "BID",
"id": "33611"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "PACKETSTORM",
"id": "74717"
},
{
"db": "PACKETSTORM",
"id": "74745"
},
{
"db": "PACKETSTORM",
"id": "94796"
},
{
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"id": "VAR-200902-0673",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.383658004
},
"last_update_date": "2023-12-18T13:15:24.746000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HPSBPI02398",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01623905"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "NVD",
"id": "CVE-2008-4419"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01623905"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/33779"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/33611"
},
{
"trust": 1.6,
"url": "http://www.securitytracker.com/id?1021687"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/500657/100/0/threaded"
},
{
"trust": 1.0,
"url": "http://www.vupen.com/english/advisories/2009/0341"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4419"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4419"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/500657/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2009/0341"
},
{
"trust": 0.3,
"url": " http://www.phptoys.com/product/micro-news.html"
},
{
"trust": 0.3,
"url": "/archive/1/500986"
},
{
"trust": 0.3,
"url": "/archive/1/500657"
},
{
"trust": 0.3,
"url": "/archive/1/500724"
},
{
"trust": 0.2,
"url": "http://www.itrc.hp.com/service/cki/secbullarchive.do"
},
{
"trust": 0.2,
"url": "http://www.hp.com"
},
{
"trust": 0.2,
"url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4419"
},
{
"trust": 0.2,
"url": "http://h30046.www3.hp.com/subsignin.php"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21325/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21329/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21324/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21328/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21327/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/33779/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21326/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/21330/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://www.hp.com/go/secureprinting"
}
],
"sources": [
{
"db": "BID",
"id": "33611"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "PACKETSTORM",
"id": "74717"
},
{
"db": "PACKETSTORM",
"id": "74745"
},
{
"db": "PACKETSTORM",
"id": "94796"
},
{
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "33611"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"db": "PACKETSTORM",
"id": "74717"
},
{
"db": "PACKETSTORM",
"id": "74745"
},
{
"db": "PACKETSTORM",
"id": "94796"
},
{
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-02-04T00:00:00",
"db": "BID",
"id": "33611"
},
{
"date": "2009-06-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"date": "2009-02-05T17:25:58",
"db": "PACKETSTORM",
"id": "74717"
},
{
"date": "2009-02-06T22:19:09",
"db": "PACKETSTORM",
"id": "74745"
},
{
"date": "2010-10-15T03:52:07",
"db": "PACKETSTORM",
"id": "94796"
},
{
"date": "2009-02-05T00:30:00.203000",
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"date": "2009-02-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-13T17:33:00",
"db": "BID",
"id": "33611"
},
{
"date": "2009-06-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-001354"
},
{
"date": "2018-10-11T20:51:49.523000",
"db": "NVD",
"id": "CVE-2008-4419"
},
{
"date": "2009-03-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural HP Built into the product Web server HP-ChaiSOE 1.0 of HP JetDirect Web In the management interface Directory traversal vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001354"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "path traversal",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200902-089"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.