ID

VAR-200902-0673


CVE

CVE-2008-4419


TITLE

plural HP Built into the product Web server HP-ChaiSOE 1.0 of HP JetDirect Web In the management interface Directory traversal vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-001354

DESCRIPTION

Directory traversal vulnerability in the HP JetDirect web administration interface in the HP-ChaiSOE 1.0 embedded web server on the LaserJet 9040mfp, LaserJet 9050mfp, and Color LaserJet 9500mfp before firmware 08.110.9; LaserJet 4345mfp and 9200C Digital Sender before firmware 09.120.9; Color LaserJet 4730mfp before firmware 46.200.9; LaserJet 2410, LaserJet 2420, and LaserJet 2430 before firmware 20080819 SPCL112A; LaserJet 4250 and LaserJet 4350 before firmware 20080819 SPCL015A; and LaserJet 9040 and LaserJet 9050 before firmware 20080819 SPCL110A allows remote attackers to read arbitrary files via directory traversal sequences in the URI. Multiple HP printers are prone to an unspecified directory-traversal vulnerability because the device's webserver fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. The vulnerability is caused due to an input validation error within the embedded web server, which can be exploited to gain access to files outside the web root via directory traversal attacks. Vulnerability Research Team ORIGINAL ADVISORY: HPSBPI02398 SSRT080166: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01623905 Version: 1 HPSBPI02398 SSRT080166 rev.1 - Certain HP LaserJet Printers, HP Color LaserJet Printers, and HP Digital Senders, Remote Unauthorized Access to Files NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability could be exploited remotely to gain unauthorized access to files. References: CVE-2008-4419 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com. RESOLUTION HP has provided firmware updates and preliminary firmware updates to resolve this vulnerability. The firmware updates and preliminary firmware updates are available as described below. Note: Each firmware update has instructions for finding the firmware version installed on the product. File - lj24x0fw_08_112_spcl112A.rfu MD5 Sum - b3dbcc8d6d465b0a264b662b13a19685 File - lj4x50fw_08_015_spcl015A.rfu MD5 Sum - 1acfd981cad26e002f655332b1ba5954 File - lj9050-50fw_08_110_spcl110A.rfu MD5 Sum - ed2ded960ba70e563b58e506fbe1faae File - InstallationInstructions.rtf MD5 Sum - 1feb8410771d698ea9599d2fcc462a2d Install the preliminary firmware update as described in the InstallationInstructions.rtf file. PRODUCT SPECIFIC INFORMATION None HISTORY Version:1 (rev.1) - 4 February 2009 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." \xa9Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQA/AwUBSYmjW+AfOvwtKn1ZEQJvsQCgpPvSzv5fsmj0X5VKefFVqoVNDA4Anjjo 4sKcDkXGzBXY6VTVHHBnLQ6d =GiEL -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2008-4419 // JVNDB: JVNDB-2009-001354 // BID: 33611 // PACKETSTORM: 74717 // PACKETSTORM: 74745 // PACKETSTORM: 94796

AFFECTED PRODUCTS

vendor:hpmodel:laserjet 2410scope:lteversion:20070410_08.112.3

Trust: 1.0

vendor:hpmodel:laserjet 9040scope:lteversion:20080204_08.110.0

Trust: 1.0

vendor:hpmodel:laserjet 4345mfpscope:lteversion:20081211_09.131.1

Trust: 1.0

vendor:hpmodel:laserjet 9050scope:lteversion:20080204_08.110.0

Trust: 1.0

vendor:hpmodel:laserjet 9050mfpscope:lteversion:20080204_08.110.0

Trust: 1.0

vendor:hpmodel:laserjet 4250scope:lteversion:20080319_08.015.0

Trust: 1.0

vendor:hpmodel:color laserjet 4370mfpscope:lteversion:20081211_46.211.2

Trust: 1.0

vendor:hpmodel:color laserjet 9500mfpscope:lteversion:20070719_05.011.2

Trust: 1.0

vendor:hpmodel:laserjet 2420scope:lteversion:20070410_08.112.3

Trust: 1.0

vendor:hpmodel:laserjet 4350scope:lteversion:20080319_08.015.0

Trust: 1.0

vendor:hpmodel:laserjet 9040mfpscope:lteversion:20080204_08.110.0

Trust: 1.0

vendor:hpmodel:laserjet 2430scope:lteversion:20070410_08.112.3

Trust: 1.0

vendor:hpmodel:9200c digital senderscope:lteversion:20081211_09.131.1

Trust: 1.0

vendor:hewlett packardmodel:hp 9200c digital senderscope:ltversion:09.120.9

Trust: 0.8

vendor:hewlett packardmodel:hp color laserjetscope:ltversion:4730mfp 46.200.9

Trust: 0.8

vendor:hewlett packardmodel:hp color laserjetscope:ltversion:9500mfp 08.110.9

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:2410 20080819 spcl112a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:2420 20080819 spcl112a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:2430 20080819 spcl112a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:4250 20080819 spcl015a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:4345mfp 09.120.9

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:4350 20080819 spcl015a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:9040 20080819 spcl110a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:9040mfp 08.110.9

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:9050 20080819 spcl110a

Trust: 0.8

vendor:hewlett packardmodel:hp laserjetscope:ltversion:9050mfp 08.110.9

Trust: 0.8

vendor:hpmodel:laserjet 9050mfpscope:eqversion:20080204_08.110.0

Trust: 0.6

vendor:hpmodel:laserjet 4350scope:eqversion:20080319_08.015.0

Trust: 0.6

vendor:hpmodel:color laserjet 4370mfpscope:eqversion:20081211_46.211.2

Trust: 0.6

vendor:hpmodel:9200c digital senderscope:eqversion:20081211_09.131.1

Trust: 0.6

vendor:hpmodel:laserjet 9040scope:eqversion:20080204_08.110.0

Trust: 0.6

vendor:hpmodel:color laserjet 9500mfpscope:eqversion:20070719_05.011.2

Trust: 0.6

vendor:hpmodel:laserjet 4345mfpscope:eqversion:20081211_09.131.1

Trust: 0.6

vendor:hpmodel:laserjet 4250scope:eqversion:20080319_08.015.0

Trust: 0.6

vendor:hpmodel:laserjet 9050scope:eqversion:20080204_08.110.0

Trust: 0.6

vendor:hpmodel:laserjet 9040mfpscope:eqversion:20080204_08.110.0

Trust: 0.6

vendor:hpmodel:laserjet p4015scope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet p3015scope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet p3005scope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet 9050mpfscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet mfpscope:eqversion:90500

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:90500

Trust: 0.3

vendor:hpmodel:laserjet 9040mpfscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:90400

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:4350

Trust: 0.3

vendor:hpmodel:laserjet 4345mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:laserjet mfpscope:eqversion:43450

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:42500

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:24300

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:24200

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:24100

Trust: 0.3

vendor:hpmodel:laserjetscope:eqversion:5200

Trust: 0.3

vendor:hpmodel:ds9250c digital senderscope:eqversion:0

Trust: 0.3

vendor:hpmodel:ds9200c digital senderscope:eqversion:0

Trust: 0.3

vendor:hpmodel:digital sender 9200cscope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cp4525scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet cp4025scope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet 9500mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjetscope:eqversion:5550

Trust: 0.3

vendor:hpmodel:color laserjet 4730mfpscope:eqversion:0

Trust: 0.3

vendor:hpmodel:color laserjet mfpscope:eqversion:47300

Trust: 0.3

sources: BID: 33611 // JVNDB: JVNDB-2009-001354 // CNNVD: CNNVD-200902-089 // NVD: CVE-2008-4419

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-4419
value: HIGH

Trust: 1.0

NVD: CVE-2008-4419
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200902-089
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2008-4419
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-001354 // CNNVD: CNNVD-200902-089 // NVD: CVE-2008-4419

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2009-001354 // NVD: CVE-2008-4419

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200902-089

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-200902-089

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001354

PATCH

title:HPSBPI02398url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01623905

Trust: 0.8

sources: JVNDB: JVNDB-2009-001354

EXTERNAL IDS

db:NVDid:CVE-2008-4419

Trust: 2.9

db:BIDid:33611

Trust: 1.9

db:SECUNIAid:33779

Trust: 1.7

db:SECTRACKid:1021687

Trust: 1.6

db:VUPENid:ADV-2009-0341

Trust: 1.6

db:JVNDBid:JVNDB-2009-001354

Trust: 0.8

db:BUGTRAQid:20090204 DDIVRT-2008-19 HP JETDIRECT WEB ADMINISTRATION DIRECTORY TRAVERSAL

Trust: 0.6

db:HPid:HPSBPI02398

Trust: 0.6

db:CNNVDid:CNNVD-200902-089

Trust: 0.6

db:PACKETSTORMid:74717

Trust: 0.1

db:PACKETSTORMid:74745

Trust: 0.1

db:PACKETSTORMid:94796

Trust: 0.1

sources: BID: 33611 // JVNDB: JVNDB-2009-001354 // PACKETSTORM: 74717 // PACKETSTORM: 74745 // PACKETSTORM: 94796 // CNNVD: CNNVD-200902-089 // NVD: CVE-2008-4419

REFERENCES

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01623905

Trust: 2.6

url:http://www.securitytracker.com/id?1021687

Trust: 1.6

url:http://www.securityfocus.com/bid/33611

Trust: 1.6

url:http://secunia.com/advisories/33779

Trust: 1.6

url:http://www.vupen.com/english/advisories/2009/0341

Trust: 1.0

url:http://www.securityfocus.com/archive/1/500657/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4419

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4419

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/500657/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2009/0341

Trust: 0.6

url: http://www.phptoys.com/product/micro-news.html

Trust: 0.3

url:/archive/1/500986

Trust: 0.3

url:/archive/1/500657

Trust: 0.3

url:/archive/1/500724

Trust: 0.3

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.2

url:http://www.hp.com

Trust: 0.2

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2008-4419

Trust: 0.2

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.2

url:http://secunia.com/advisories/product/21325/

Trust: 0.1

url:http://secunia.com/advisories/product/21329/

Trust: 0.1

url:http://secunia.com/advisories/product/21324/

Trust: 0.1

url:http://secunia.com/advisories/product/21328/

Trust: 0.1

url:http://secunia.com/advisories/product/21327/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/33779/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/product/21326/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/product/21330/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.hp.com/go/secureprinting

Trust: 0.1

sources: BID: 33611 // JVNDB: JVNDB-2009-001354 // PACKETSTORM: 74717 // PACKETSTORM: 74745 // PACKETSTORM: 94796 // CNNVD: CNNVD-200902-089 // NVD: CVE-2008-4419

CREDITS

Shmoov and rb13$, Digital Defense, Inc. Vulnerability Research Team

Trust: 0.6

sources: CNNVD: CNNVD-200902-089

SOURCES

db:BIDid:33611
db:JVNDBid:JVNDB-2009-001354
db:PACKETSTORMid:74717
db:PACKETSTORMid:74745
db:PACKETSTORMid:94796
db:CNNVDid:CNNVD-200902-089
db:NVDid:CVE-2008-4419

LAST UPDATE DATE

2025-04-10T23:19:48.463000+00:00


SOURCES UPDATE DATE

db:BIDid:33611date:2010-04-13T17:33:00
db:JVNDBid:JVNDB-2009-001354date:2009-06-30T00:00:00
db:CNNVDid:CNNVD-200902-089date:2009-03-06T00:00:00
db:NVDid:CVE-2008-4419date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:33611date:2009-02-04T00:00:00
db:JVNDBid:JVNDB-2009-001354date:2009-06-30T00:00:00
db:PACKETSTORMid:74717date:2009-02-05T17:25:58
db:PACKETSTORMid:74745date:2009-02-06T22:19:09
db:PACKETSTORMid:94796date:2010-10-15T03:52:07
db:CNNVDid:CNNVD-200902-089date:2009-02-05T00:00:00
db:NVDid:CVE-2008-4419date:2009-02-05T00:30:00.203