ID

VAR-201212-0016


CVE

CVE-2012-3272


TITLE

HP Color LaserJet and LaserJet Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2012-005674

DESCRIPTION

Cross-site scripting (XSS) vulnerability on the HP Color LaserJet CM3530 with firmware before 53.190.9, Color LaserJet CM60xx with firmware before 52.210.9, Color LaserJet CP3525 with firmware before 06.140.3 18, Color LaserJet CP4xxx with firmware before 07.120.6, Color LaserJet CP6015 with firmware before 04.160.3, LaserJet P3015 with firmware before 07.140.3, and LaserJet P4xxx with firmware before 04.170.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. There are security holes in HP laser printers and color laser printers from multiple Hewlett-Packard companies. Allows an attacker to exploit a vulnerability for cross-site scripting attacks to obtain sensitive information or hijack user sessions. Multiple HP printers are prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03556108 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03556108 Version: 1 HPSBPI02828 SSRT100778 rev.1 - HP LaserJet and Color LaserJet, Cross-Site Scripting (XSS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2012-12-03 Last Updated: 2012-12-03 Potential Security Impact: Cross-site scripting (XSS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP LaserJet and Color LaserJet printers. References: CVE-2012-3272 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. To obtain the firmware, go to http://www.hp.com and follow these steps. Click on Support and Drivers Use the Drivers & Software tab and enter the impacted product number and search for that product Select the product Select the operating system Select and download the Firmware version listed, or a later version, if available Product Number Firmware Version HP Color LaserJet CM3530 Update to version 53.190.9 21 Aug 2012 or later HP Color LaserJet CM6030 Update to version 52.210.9 21 Aug 2012 or later HP Color LaserJet CM6040 Update to version 52.210.9 21 Aug 2012 or later HP Color LaserJet CP3525 Update to version 06.140.3 18 18 Jul 2012 or later HP Color LaserJet CP4025 Update to version 07.120.6 21 Aug 2012 or later HP Color LaserJet CP4525 Update to version 07.120.6 21 Aug 2012 or later HP Color LaserJet CP6015 Update to version 04.160.3 18 Jul 2012 or later HP LaserJet P3015 Update to version 07.140.3 18 Jul 2012 or later HP LaserJet P4014 Update to version 04.170.3 18 Jul 2012 or later HP LaserJet P4015 Update to version 04.170.3 18 Jul 2012 or later HP LaserJet P4515 Update to version 04.170.3 18 Jul 2012 or later HISTORY Version:1 (rev.1) - 3 December 2012 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlC89IUACgkQ4B86/C0qfVkLXQCg96zP/umFE7UxvpCjaVZCejRs gM8AoPyEVtyJEIoWEQqsugnrkljoki3u =FDjD -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Certain unspecified input is not properly sanitised before being returned to the user. Please see the vendor's advisory for the list of affected devices. PROVIDED AND/OR DISCOVERED BY: The vendor credits Dominic Sim, KPMG. ORIGINAL ADVISORY: HPSBPI02828 SSRT100778: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03556108 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-3272 // JVNDB: JVNDB-2012-005674 // CNVD: CNVD-2012-7316 // BID: 56820 // PACKETSTORM: 118642 // PACKETSTORM: 118656

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-7316

AFFECTED PRODUCTS

vendor:hpmodel:color laserjet cp6015scope:lteversion:04.160.2

Trust: 1.0

vendor:hpmodel:laserjet p4xxxscope:lteversion:04.170.2

Trust: 1.0

vendor:hpmodel:color laserjet cm3530scope:lteversion:53.190.8

Trust: 1.0

vendor:hpmodel:color laserjet cm60xxscope:lteversion:53.190.8

Trust: 1.0

vendor:hpmodel:color laserjet cp3525scope:lteversion:06.140.3.17

Trust: 1.0

vendor:hpmodel:color laserjet cp4xxxscope:lteversion:07.120.5

Trust: 1.0

vendor:hpmodel:laserjet p3015scope:lteversion:07.140.2

Trust: 1.0

vendor:hpmodel:color laserjet cp3525scope: - version: -

Trust: 0.9

vendor:hpmodel:color laserjet cp6015scope: - version: -

Trust: 0.9

vendor:hewlett packardmodel:hp color laserjet cm3530scope:ltversion:53.190.9

Trust: 0.8

vendor:hewlett packardmodel:hp color laserjet cm60xxscope:ltversion:52.210.9

Trust: 0.8

vendor:hewlett packardmodel:hp color laserjet cp3525scope:ltversion:06.140.3 18

Trust: 0.8

vendor:hewlett packardmodel:hp color laserjet cp4xxxscope:ltversion:07.120.6

Trust: 0.8

vendor:hewlett packardmodel:hp color laserjet cp6015scope:ltversion:04.160.3

Trust: 0.8

vendor:hewlett packardmodel:hp laserjet p3015scope:ltversion:07.140.3

Trust: 0.8

vendor:hewlett packardmodel:hp laserjet p4xxxscope:ltversion:04.170.3

Trust: 0.8

vendor:hpmodel:laserjet p3015scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet p4014scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet p4015scope: - version: -

Trust: 0.6

vendor:hpmodel:laserjet p4515scope: - version: -

Trust: 0.6

vendor:hpmodel:color laserjet cp4525scope: - version: -

Trust: 0.6

vendor:hpmodel:color laserjet cm6040scope: - version: -

Trust: 0.6

vendor:hpmodel:color laserjet cm3530scope: - version: -

Trust: 0.6

vendor:hpmodel:color laserjet cm6030scope: - version: -

Trust: 0.6

vendor:hpmodel:color laserjet cp4025scope: - version: -

Trust: 0.6

vendor:hpmodel:color laserjet cm60xxscope:eqversion:53.190.8

Trust: 0.6

vendor:hpmodel:color laserjet cp4xxxscope:eqversion:07.120.5

Trust: 0.6

vendor:hpmodel:color laserjet cm3530scope:eqversion:53.190.8

Trust: 0.6

vendor:hpmodel:color laserjet cp3525scope:eqversion:06.140.3.17

Trust: 0.6

vendor:hpmodel:laserjet p3015scope:eqversion:07.140.2

Trust: 0.6

vendor:hpmodel:color laserjet cp6015scope:eqversion:04.160.2

Trust: 0.6

vendor:hpmodel:laserjet p4xxxscope:eqversion:04.170.2

Trust: 0.6

vendor:hpmodel:laserjet p4515scope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet p4015scope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet p4014scope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet p3015scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cp4525scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cp4025scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cm6040scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cm6030scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cm3530scope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2012-7316 // BID: 56820 // JVNDB: JVNDB-2012-005674 // CNNVD: CNNVD-201212-090 // NVD: CVE-2012-3272

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3272
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-3272
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201212-090
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2012-3272
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2012-005674 // CNNVD: CNNVD-201212-090 // NVD: CVE-2012-3272

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2012-005674 // NVD: CVE-2012-3272

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201212-090

TYPE

xss

Trust: 0.8

sources: PACKETSTORM: 118642 // PACKETSTORM: 118656 // CNNVD: CNNVD-201212-090

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005674

PATCH

title:HPSBPI02828 SSRT100778url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03556108

Trust: 0.8

title:Patch for HP LaserJet/Color LaserJet Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/26251

Trust: 0.6

sources: CNVD: CNVD-2012-7316 // JVNDB: JVNDB-2012-005674

EXTERNAL IDS

db:NVDid:CVE-2012-3272

Trust: 3.4

db:SECTRACKid:1027841

Trust: 1.0

db:JVNDBid:JVNDB-2012-005674

Trust: 0.8

db:SECUNIAid:51505

Trust: 0.7

db:CNVDid:CNVD-2012-7316

Trust: 0.6

db:HPid:HPSBPI02828

Trust: 0.6

db:HPid:SSRT100778

Trust: 0.6

db:CNNVDid:CNNVD-201212-090

Trust: 0.6

db:BIDid:56820

Trust: 0.3

db:PACKETSTORMid:118642

Trust: 0.1

db:PACKETSTORMid:118656

Trust: 0.1

sources: CNVD: CNVD-2012-7316 // BID: 56820 // JVNDB: JVNDB-2012-005674 // PACKETSTORM: 118642 // PACKETSTORM: 118656 // CNNVD: CNNVD-201212-090 // NVD: CVE-2012-3272

REFERENCES

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03556108

Trust: 2.3

url:http://www.securitytracker.com/id?1027841

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3272

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3272

Trust: 0.8

url:http://archives.neohapsis.com/archives/bugtraq/2012-12/0042.html

Trust: 0.6

url:http://secunia.com/advisories/51505

Trust: 0.6

url: http://www.phptoys.com/product/micro-news.html

Trust: 0.3

url:https://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c03556108-1%257cdoclocale%253d%

Trust: 0.3

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:http://www.hp.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3272

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51505

Trust: 0.1

url:http://secunia.com/advisories/51505/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51505/#comments

Trust: 0.1

sources: CNVD: CNVD-2012-7316 // BID: 56820 // JVNDB: JVNDB-2012-005674 // PACKETSTORM: 118642 // PACKETSTORM: 118656 // CNNVD: CNNVD-201212-090 // NVD: CVE-2012-3272

CREDITS

Dominic Sim of KPMG

Trust: 0.3

sources: BID: 56820

SOURCES

db:CNVDid:CNVD-2012-7316
db:BIDid:56820
db:JVNDBid:JVNDB-2012-005674
db:PACKETSTORMid:118642
db:PACKETSTORMid:118656
db:CNNVDid:CNNVD-201212-090
db:NVDid:CVE-2012-3272

LAST UPDATE DATE

2024-11-23T22:13:54.328000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-7316date:2012-12-10T00:00:00
db:BIDid:56820date:2012-12-03T00:00:00
db:JVNDBid:JVNDB-2012-005674date:2012-12-07T00:00:00
db:CNNVDid:CNNVD-201212-090date:2012-12-07T00:00:00
db:NVDid:CVE-2012-3272date:2024-11-21T01:40:33.343

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-7316date:2012-12-10T00:00:00
db:BIDid:56820date:2012-12-03T00:00:00
db:JVNDBid:JVNDB-2012-005674date:2012-12-07T00:00:00
db:PACKETSTORMid:118642date:2012-12-06T05:26:35
db:PACKETSTORMid:118656date:2012-12-06T09:09:23
db:CNNVDid:CNNVD-201212-090date:2012-12-07T00:00:00
db:NVDid:CVE-2012-3272date:2012-12-06T11:45:47.060