ID

VAR-201011-0192


CVE

CVE-2010-4107


TITLE

plural HP Used in printer products File System External Access Setting PJL Access value Arbitrary file read vulnerability in default settings

Trust: 0.8

sources: JVNDB: JVNDB-2010-003342

DESCRIPTION

The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack. HP LaserJet Printers is a line of laser printers from Hewlett Packard. The affected printer products are as follows: * HP LaserJet MFP printers (all supported print job language (PJL) models).* HP Color LaserJet MFP printers (all supported print job language (PJL) models).* HP LaserJet 4100, 4200 , 4300, 5100, 8150 and 9000 series. Multiple HP printers are prone to a directory-traversal vulnerability because the devices' webserver fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM) Beta. Join the beta: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: HP LaserJet Printers PJL Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA42238 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42238/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42238 RELEASE DATE: 2010-11-17 DISCUSS ADVISORY: http://secunia.com/advisories/42238/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42238/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42238 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in HP LaserJet Printers, which can be exploited by malicious people to disclose potentially sensitive information. SOLUTION: Apply the workaround (please see the vendor's advisory for details). Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Moritz Jodeit, n.runs AG. ORIGINAL ADVISORY: HPSBPI02575 SSRT090255: https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The vulnerability could be exploited remotely to gain unauthorized access to files. References: CVE-2010-4107 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The vulnerability can be avoided by either one of the following actions: disable file system access via the PJL interface set a PJL password These recommendations are documented in the "HP Imaging and Printing Security Best Practices - Configuring Security for Multiple LaserJet MFPs and Color LaserJet MFPs" manual, available here: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c01707469/c01707469.pdf?jumpid=reg_R1002_USEN PRODUCT SPECIFIC INFORMATION None HISTORY Version:1 (rev.1) - 15 November 2010 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2010 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkzhBl0ACgkQ4B86/C0qfVnKygCg3C3tUUIdfs4kS2lwHfGa7ayn UFsAoNqbOe7VIg0V4M/CdoHWlyTClza7 =/Da0 -----END PGP SIGNATURE-----

Trust: 2.7

sources: NVD: CVE-2010-4107 // JVNDB: JVNDB-2010-003342 // CNVD: CNVD-2010-2826 // BID: 44882 // VULMON: CVE-2010-4107 // PACKETSTORM: 95904 // PACKETSTORM: 95887

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-2826

AFFECTED PRODUCTS

vendor:hpmodel:laserjet mfpscope:eqversion:*

Trust: 1.0

vendor:hpmodel:color laserjet mfpscope:eqversion:*

Trust: 1.0

vendor:hpmodel:laserjet 5100scope:eqversion:*

Trust: 1.0

vendor:hpmodel:laserjet 4300scope:eqversion:*

Trust: 1.0

vendor:hpmodel:9000scope:eqversion:*

Trust: 1.0

vendor:hpmodel:laserjet 8150scope:eqversion:*

Trust: 1.0

vendor:hpmodel:laserjet 4200scope:eqversion:*

Trust: 1.0

vendor:hpmodel:laserjet 4100scope:eqversion:*

Trust: 1.0

vendor:hewlett packardmodel:9000scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:color laserjet mfpscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:laserjet 4100scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:laserjet 4200scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:laserjet 4300scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:laserjet 5100scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:laserjet 8150scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:laserjet mfpscope: - version: -

Trust: 0.8

vendor:hpmodel:color lasterjet mfpscope:eqversion:6040

Trust: 0.6

vendor:hpmodel:lasterjet m5025/5035 mfpscope: - version: -

Trust: 0.6

vendor:hpmodel:lasterjet m3027/3035 mfpscope: - version: -

Trust: 0.6

vendor:hpmodel:lasterjet m1522n mfpscope: - version: -

Trust: 0.6

vendor:hpmodel:lasterjet seriesscope:eqversion:9000

Trust: 0.6

vendor:hpmodel:lasterjet seriesscope:eqversion:8150

Trust: 0.6

vendor:hpmodel:lasterjet seriesscope:eqversion:5100

Trust: 0.6

vendor:hpmodel:lasterjet seriesscope:eqversion:4300

Trust: 0.6

vendor:hpmodel:lasterjet seriesscope:eqversion:4200

Trust: 0.6

vendor:hpmodel:lasterjet seriesscope:eqversion:4100

Trust: 0.6

vendor:hpmodel:color laserjet mfpscope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet 4200scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet 4300scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet 5100scope: - version: -

Trust: 0.6

vendor:hpmodel:9000scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet 8150scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet mfpscope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet 4100scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet m9050 mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet m4345x mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet m1522n mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet mfpscope:eqversion:90500

Trust: 0.3

vendor:hpmodel:laserjet 9000mfpscope: - version: -

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:9000

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:8150

Trust: 0.3

vendor:hpmodel:laserjet mfpscope:eqversion:50350

Trust: 0.3

vendor:hpmodel:laserjet 4345mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet mfpscope:eqversion:43450

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:4300

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:4200

Trust: 0.3

vendor:hpmodel:laserjet 4100mfpscope: - version: -

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:4100

Trust: 0.3

vendor:hpmodel:laserjet mfpscope:eqversion:30350

Trust: 0.3

vendor:hpmodel:laserjet seriesscope:eqversion:5100

Trust: 0.3

vendor:hpmodel:color laserjet cm4730 mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet 9500mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet mfpscope:eqversion:60400

Trust: 0.3

vendor:hpmodel:color laserjet 4730mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet mfpscope:eqversion:47300

Trust: 0.3

sources: CNVD: CNVD-2010-2826 // BID: 44882 // JVNDB: JVNDB-2010-003342 // CNNVD: CNNVD-201011-192 // NVD: CVE-2010-4107

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4107
value: HIGH

Trust: 1.0

NVD: CVE-2010-4107
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201011-192
value: HIGH

Trust: 0.6

VULMON: CVE-2010-4107
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-4107
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2010-4107 // JVNDB: JVNDB-2010-003342 // CNNVD: CNNVD-201011-192 // NVD: CVE-2010-4107

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2010-003342 // NVD: CVE-2010-4107

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201011-192

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201011-192

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003342

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2010-4107

PATCH

title:HPSBPI02575 SSRT090255url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02004333

Trust: 0.8

title:Patch for HP LaserJet Printers PJL Directory Traversal Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/1746

Trust: 0.6

title:HP: HPSBPI02575 SSRT090255 rev.3 - HP LaserJet MFP Printers, HP Color LaserJet MFP Printers, Certain HP LaserJet Printers, Remote Unauthorized Access to Filesurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBPI02575

Trust: 0.1

sources: CNVD: CNVD-2010-2826 // VULMON: CVE-2010-4107 // JVNDB: JVNDB-2010-003342

EXTERNAL IDS

db:NVDid:CVE-2010-4107

Trust: 3.5

db:SECUNIAid:42238

Trust: 2.4

db:SECTRACKid:1024741

Trust: 1.7

db:VUPENid:ADV-2010-2987

Trust: 1.7

db:BIDid:44882

Trust: 1.4

db:SREASONid:8328

Trust: 1.1

db:EXPLOIT-DBid:15631

Trust: 1.1

db:JVNDBid:JVNDB-2010-003342

Trust: 0.8

db:CNVDid:CNVD-2010-2826

Trust: 0.6

db:NSFOCUSid:16009

Trust: 0.6

db:HPid:SSRT090255

Trust: 0.6

db:HPid:HPSBPI02575

Trust: 0.6

db:XFid:63261

Trust: 0.6

db:CNNVDid:CNNVD-201011-192

Trust: 0.6

db:EXPLOIT-DBid:32990

Trust: 0.1

db:VULMONid:CVE-2010-4107

Trust: 0.1

db:PACKETSTORMid:95904

Trust: 0.1

db:PACKETSTORMid:95887

Trust: 0.1

sources: CNVD: CNVD-2010-2826 // VULMON: CVE-2010-4107 // BID: 44882 // JVNDB: JVNDB-2010-003342 // PACKETSTORM: 95904 // PACKETSTORM: 95887 // CNNVD: CNNVD-201011-192 // NVD: CVE-2010-4107

REFERENCES

url:http://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02004333

Trust: 2.7

url:http://www.vupen.com/english/advisories/2010/2987

Trust: 1.7

url:http://secunia.com/advisories/42238

Trust: 1.7

url:http://securitytracker.com/id?1024741

Trust: 1.7

url:http://www.nruns.com/_downloads/sa-2010%20003-hewlett-packard.pdf

Trust: 1.4

url:http://www.securityfocus.com/bid/44882

Trust: 1.1

url:http://www.exploit-db.com/exploits/15631

Trust: 1.1

url:http://securityreason.com/securityalert/8328

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/63261

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4107

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4107

Trust: 0.8

url:http://secunia.com/advisories/42238/

Trust: 0.7

url:http://xforce.iss.net/xforce/xfdb/63261

Trust: 0.6

url:http://www.nsfocus.net/vulndb/16009

Trust: 0.6

url:http://www.hp.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/32990/

Trust: 0.1

url:https://support.hp.com/us-en/document/c02004333

Trust: 0.1

url:http://secunia.com/advisories/42238/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42238

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.hp.com/go/secureprinting

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4107

Trust: 0.1

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.1

url:http://h20000.www2.hp.com/bc/docs/support/supportmanual/c01707469/c01707469.pdf?jumpid=reg_r1002_usen

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.1

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.1

sources: CNVD: CNVD-2010-2826 // VULMON: CVE-2010-4107 // BID: 44882 // JVNDB: JVNDB-2010-003342 // PACKETSTORM: 95904 // PACKETSTORM: 95887 // CNNVD: CNNVD-201011-192 // NVD: CVE-2010-4107

CREDITS

Moritz Jodeit

Trust: 0.6

sources: CNNVD: CNNVD-201011-192

SOURCES

db:CNVDid:CNVD-2010-2826
db:VULMONid:CVE-2010-4107
db:BIDid:44882
db:JVNDBid:JVNDB-2010-003342
db:PACKETSTORMid:95904
db:PACKETSTORMid:95887
db:CNNVDid:CNNVD-201011-192
db:NVDid:CVE-2010-4107

LAST UPDATE DATE

2024-11-23T22:35:38.506000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-2826date:2010-11-17T00:00:00
db:VULMONid:CVE-2010-4107date:2017-08-17T00:00:00
db:BIDid:44882date:2014-05-06T01:11:00
db:JVNDBid:JVNDB-2010-003342date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201011-192date:2010-11-19T00:00:00
db:NVDid:CVE-2010-4107date:2024-11-21T01:20:15.917

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-2826date:2010-11-17T00:00:00
db:VULMONid:CVE-2010-4107date:2010-11-17T00:00:00
db:BIDid:44882date:2010-11-15T00:00:00
db:JVNDBid:JVNDB-2010-003342date:2012-03-27T00:00:00
db:PACKETSTORMid:95904date:2010-11-17T12:19:14
db:PACKETSTORMid:95887date:2010-11-16T20:59:33
db:CNNVDid:CNNVD-201011-192date:2010-11-19T00:00:00
db:NVDid:CVE-2010-4107date:2010-11-17T16:00:02.623