Directory traversal vulnerability in the HP JetDirect web administration interface in the HP-ChaiSOE 1.0 embedded web server on the LaserJet 9040mfp, LaserJet 9050mfp, and Color LaserJet 9500mfp before firmware 08.110.9; LaserJet 4345mfp and 9200C Digital Sender before firmware 09.120.9; Color LaserJet 4730mfp before firmware 46.200.9; LaserJet 2410, LaserJet 2420, and LaserJet 2430 before firmware 20080819 SPCL112A; LaserJet 4250 and LaserJet 4350 before firmware 20080819 SPCL015A; and LaserJet 9040 and LaserJet 9050 before firmware 20080819 SPCL110A allows remote attackers to read arbitrary files via directory traversal sequences in the URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/33779 | third party advisory |
http://www.securityfocus.com/bid/33611 | vdb entry |
http://www.securityfocus.com/archive/1/500657/100/0/threaded | mailing list |
http://www.securitytracker.com/id?1021687 | vdb entry |
http://www.vupen.com/english/advisories/2009/0341 | vdb entry |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905 | vendor advisory |