ID

VAR-201201-0273


CVE

CVE-2011-4785


TITLE

plural HP Product HP-ChaiSOE Web Server traversal vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-001037

DESCRIPTION

Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419. plural HP Product HP-ChaiSOE Web The server contains a directory traversal vulnerability. This vulnerability CVE-2008-4419 Is a different vulnerability.A third party may be able to read arbitrary files. HP LaserJet printers is prone to a directory-traversal vulnerability. Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. HP LaserJet P3015 with firmware 07.080.3 or later is vulnerable. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: HP LaserJet P3015 Unspecified Security Bypass Vulnerability SECUNIA ADVISORY ID: SA47457 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47457/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47457 RELEASE DATE: 2012-01-09 DISCUSS ADVISORY: http://secunia.com/advisories/47457/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47457/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47457 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in HP LaserJet P3015, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is reported in versions prior to 07.080.3. SOLUTION: Update to version 07.080.3. PROVIDED AND/OR DISCOVERED BY: The vendor credits Digital Defense, Inc. Vulnerability Research Team ORIGINAL ADVISORY: HPSBPI02733 SSRT100646: http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03140700 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Solution Description: At this time, the vendor has been notified of the vulnerability and has released a patch which addresses the issue for HP LaserJet P3015. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03140700 Version: 1 HPSBPI02733 SSRT100646 rev.1 - Certain HP LaserJet Printers, Remote Unauthorized Access to Files NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2012-01-09 Last Updated: 2012-01-09 Potential Security Impact: Remote unauthorized access to files Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP LaserJet printers. The vulnerability could be exploited remotely to gain unauthorized access to files. References: CVE-2011-4785, DDIVRT-2011-37 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP LaserJet P3015 with firmware prior to 07.080.3 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-4785 (AV:N/AC:L/Au:N/C:C/I:N/A:N) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 The Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com. Firmware updates can also be downloaded as follows. Browse to www.hp.com/go/support then: Select "Drivers & Software" Enter the product name listed in the table above into the search field Click on "Search" If the search returns a list of products click on the appropriate product Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)" If the "Cross operating system ..." link is not present, select any Windows operating system from the list. Select the appropriate firmware update under "Firmware" HISTORY Version:1 (rev.1) - 9 January 2012 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk8KzyYACgkQ4B86/C0qfVkUfACg+xhdrs2B1yUnAAvOXn+DgnIw +3EAoKpo/OWY5GB47Mi4pgYUVml50iXO =tpQT -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2011-4785 // JVNDB: JVNDB-2012-001037 // BID: 51329 // PACKETSTORM: 108501 // PACKETSTORM: 108497 // PACKETSTORM: 108496

AFFECTED PRODUCTS

vendor:hpmodel:hp-chaisoescope:eqversion:1.0

Trust: 1.6

vendor:hewlett packardmodel:hp laserjet 2430scope:eqversion:firmware 08.113.0_i35128

Trust: 0.8

vendor:hewlett packardmodel:hp laserjet 4650scope:eqversion:firmware 07.006.0

Trust: 0.8

vendor:hewlett packardmodel:hp laserjet p3015scope:ltversion:firmware 07.080.3

Trust: 0.8

vendor:hewlett packardmodel:hp-chaisoescope:eqversion:1.0 web server

Trust: 0.8

vendor:hpmodel:laserjet p3015scope:eqversion:0

Trust: 0.3

sources: BID: 51329 // JVNDB: JVNDB-2012-001037 // CNNVD: CNNVD-201201-085 // NVD: CVE-2011-4785

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4785
value: HIGH

Trust: 1.0

NVD: CVE-2011-4785
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201201-085
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2011-4785
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2012-001037 // CNNVD: CNNVD-201201-085 // NVD: CVE-2011-4785

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2012-001037 // NVD: CVE-2011-4785

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201201-085

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201201-085

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001037

PATCH

title:HPSBPI02733 SSRT100646url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03140700

Trust: 0.8

sources: JVNDB: JVNDB-2012-001037

EXTERNAL IDS

db:NVDid:CVE-2011-4785

Trust: 2.9

db:SECUNIAid:47457

Trust: 1.7

db:BIDid:51329

Trust: 1.3

db:OSVDBid:78224

Trust: 1.0

db:JVNDBid:JVNDB-2012-001037

Trust: 0.8

db:BUGTRAQid:20120109 DDIVRT-2011-37 HP JETDIRECT DEVICE PAGE DIRECTORY TRAVERSAL (CVE-2011-4785)

Trust: 0.6

db:HPid:HPSBPI02733

Trust: 0.6

db:HPid:SSRT100646

Trust: 0.6

db:NSFOCUSid:18443

Trust: 0.6

db:CNNVDid:CNNVD-201201-085

Trust: 0.6

db:PACKETSTORMid:108501

Trust: 0.1

db:PACKETSTORMid:108497

Trust: 0.1

db:PACKETSTORMid:108496

Trust: 0.1

sources: BID: 51329 // JVNDB: JVNDB-2012-001037 // PACKETSTORM: 108501 // PACKETSTORM: 108497 // PACKETSTORM: 108496 // CNNVD: CNNVD-201201-085 // NVD: CVE-2011-4785

REFERENCES

url:http://www.securityfocus.com/archive/1/521160

Trust: 2.2

url:http://www.securityfocus.com/archive/1/521165

Trust: 1.6

url:http://secunia.com/advisories/47457

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72227

Trust: 1.0

url:http://www.securityfocus.com/bid/51329

Trust: 1.0

url:http://osvdb.org/78224

Trust: 1.0

url:http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4785

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4785

Trust: 0.8

url:http://www.nsfocus.net/vulndb/18443

Trust: 0.6

url: http://www.phptoys.com/product/micro-news.html

Trust: 0.3

url:/archive/1/521160

Trust: 0.3

url:/archive/1/521165

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03140700

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-4785

Trust: 0.2

url:http://secunia.com/advisories/47457/

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47457

Trust: 0.1

url:http://secunia.com/advisories/47457/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.hp.com/

Trust: 0.1

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.1

url:https://www.hp.com/go/support

Trust: 0.1

sources: BID: 51329 // JVNDB: JVNDB-2012-001037 // PACKETSTORM: 108501 // PACKETSTORM: 108497 // PACKETSTORM: 108496 // CNNVD: CNNVD-201201-085 // NVD: CVE-2011-4785

CREDITS

sxkeebler and r@b13$ of Digital Defense, Inc. Vulnerability Research Team

Trust: 0.3

sources: BID: 51329

SOURCES

db:BIDid:51329
db:JVNDBid:JVNDB-2012-001037
db:PACKETSTORMid:108501
db:PACKETSTORMid:108497
db:PACKETSTORMid:108496
db:CNNVDid:CNNVD-201201-085
db:NVDid:CVE-2011-4785

LAST UPDATE DATE

2024-11-23T22:14:05.739000+00:00


SOURCES UPDATE DATE

db:BIDid:51329date:2012-01-09T00:00:00
db:JVNDBid:JVNDB-2012-001037date:2012-01-11T00:00:00
db:CNNVDid:CNNVD-201201-085date:2012-01-11T00:00:00
db:NVDid:CVE-2011-4785date:2024-11-21T01:32:59.993

SOURCES RELEASE DATE

db:BIDid:51329date:2012-01-09T00:00:00
db:JVNDBid:JVNDB-2012-001037date:2012-01-11T00:00:00
db:PACKETSTORMid:108501date:2012-01-09T05:43:08
db:PACKETSTORMid:108497date:2012-01-09T22:37:27
db:PACKETSTORMid:108496date:2012-01-09T22:36:44
db:CNNVDid:CNNVD-201201-085date:2012-01-11T00:00:00
db:NVDid:CVE-2011-4785date:2012-01-10T11:55:05.057