All the vulnerabilites related to hp - hp-chaisoe
cve-2011-4785
Vulnerability from cvelistv5
Published
2012-01-10 11:00
Modified
2024-08-07 00:16
Severity ?
Summary
Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419.
References
http://www.securityfocus.com/archive/1/521160vendor-advisory, x_refsource_HP
http://osvdb.org/78224vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/47457third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/521160vendor-advisory, x_refsource_HP
http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.htmlmailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/521165mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/72227vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/51329vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:16:34.689Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBPI02733",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/521160"
          },
          {
            "name": "78224",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78224"
          },
          {
            "name": "47457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47457"
          },
          {
            "name": "SSRT100646",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/521160"
          },
          {
            "name": "20120109 DDIVRT-2011-37 HP JetDirect Device Page Directory Traversal (CVE-2011-4785)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html"
          },
          {
            "name": "20120109 DDIVRT-2011-37 HP JetDirect Device Page Directory Traversal (CVE-2011-4785)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/521165"
          },
          {
            "name": "hp-laserjet-unspecified-unauth-access(72227)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72227"
          },
          {
            "name": "51329",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51329"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "HPSBPI02733",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/521160"
        },
        {
          "name": "78224",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78224"
        },
        {
          "name": "47457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47457"
        },
        {
          "name": "SSRT100646",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/521160"
        },
        {
          "name": "20120109 DDIVRT-2011-37 HP JetDirect Device Page Directory Traversal (CVE-2011-4785)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html"
        },
        {
          "name": "20120109 DDIVRT-2011-37 HP JetDirect Device Page Directory Traversal (CVE-2011-4785)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/521165"
        },
        {
          "name": "hp-laserjet-unspecified-unauth-access(72227)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72227"
        },
        {
          "name": "51329",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51329"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2011-4785",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBPI02733",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/521160"
            },
            {
              "name": "78224",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78224"
            },
            {
              "name": "47457",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47457"
            },
            {
              "name": "SSRT100646",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/521160"
            },
            {
              "name": "20120109 DDIVRT-2011-37 HP JetDirect Device Page Directory Traversal (CVE-2011-4785)",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html"
            },
            {
              "name": "20120109 DDIVRT-2011-37 HP JetDirect Device Page Directory Traversal (CVE-2011-4785)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/521165"
            },
            {
              "name": "hp-laserjet-unspecified-unauth-access(72227)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72227"
            },
            {
              "name": "51329",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51329"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2011-4785",
    "datePublished": "2012-01-10T11:00:00",
    "dateReserved": "2011-12-13T00:00:00",
    "dateUpdated": "2024-08-07T00:16:34.689Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201201-0273
Vulnerability from variot

Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419. plural HP Product HP-ChaiSOE Web The server contains a directory traversal vulnerability. This vulnerability CVE-2008-4419 Is a different vulnerability.A third party may be able to read arbitrary files. HP LaserJet printers is prone to a directory-traversal vulnerability. Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. HP LaserJet P3015 with firmware 07.080.3 or later is vulnerable. ----------------------------------------------------------------------

Secunia is hiring!

Find your next job here:

http://secunia.com/company/jobs/


TITLE: HP LaserJet P3015 Unspecified Security Bypass Vulnerability

SECUNIA ADVISORY ID: SA47457

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47457/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47457

RELEASE DATE: 2012-01-09

DISCUSS ADVISORY: http://secunia.com/advisories/47457/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/47457/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=47457

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in HP LaserJet P3015, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is reported in versions prior to 07.080.3.

SOLUTION: Update to version 07.080.3.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Digital Defense, Inc. Vulnerability Research Team

ORIGINAL ADVISORY: HPSBPI02733 SSRT100646: http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03140700

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

Solution Description:

At this time, the vendor has been notified of the vulnerability and has released a patch which addresses the issue for HP LaserJet P3015. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03140700 Version: 1

HPSBPI02733 SSRT100646 rev.1 - Certain HP LaserJet Printers, Remote Unauthorized Access to Files

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2012-01-09 Last Updated: 2012-01-09

Potential Security Impact: Remote unauthorized access to files

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP LaserJet printers. The vulnerability could be exploited remotely to gain unauthorized access to files.

References: CVE-2011-4785, DDIVRT-2011-37

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP LaserJet P3015 with firmware prior to 07.080.3

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2011-4785 (AV:N/AC:L/Au:N/C:C/I:N/A:N) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com. Firmware updates can also be downloaded as follows.

Browse to www.hp.com/go/support then:

Select "Drivers & Software" Enter the product name listed in the table above into the search field Click on "Search" If the search returns a list of products click on the appropriate product Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)" If the "Cross operating system ..." link is not present, select any Windows operating system from the list. Select the appropriate firmware update under "Firmware"

HISTORY Version:1 (rev.1) - 9 January 2012 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430

Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk8KzyYACgkQ4B86/C0qfVkUfACg+xhdrs2B1yUnAAvOXn+DgnIw +3EAoKpo/OWY5GB47Mi4pgYUVml50iXO =tpQT -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201201-0273",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "hp-chaisoe",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "1.0"
      },
      {
        "model": "hp laserjet 2430",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "firmware  08.113.0_i35128"
      },
      {
        "model": "hp laserjet 4650",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "firmware  07.006.0"
      },
      {
        "model": "hp laserjet p3015",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "firmware  07.080.3"
      },
      {
        "model": "hp-chaisoe",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "1.0 web server"
      },
      {
        "model": "laserjet p3015",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "51329"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hp:hp-chaisoe:1.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:hp:laserjet_p3015:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "07.080",
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:hp:laserjet_4650:07.006.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:hp:laserjet_2430:08.113.0_i35128:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "sxkeebler and r@b13$ of Digital Defense, Inc. Vulnerability Research Team",
    "sources": [
      {
        "db": "BID",
        "id": "51329"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-4785",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.8,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2011-4785",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-4785",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201201-085",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419. plural HP Product HP-ChaiSOE Web The server contains a directory traversal vulnerability. This vulnerability CVE-2008-4419 Is a different vulnerability.A third party may be able to read arbitrary files. HP LaserJet printers is prone to a directory-traversal vulnerability. \nExploiting this issue will allow an attacker to view arbitrary local  files within the context of the webserver. Information harvested may aid  in launching further attacks. \nHP LaserJet P3015 with firmware 07.080.3 or later is vulnerable. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nHP LaserJet P3015 Unspecified Security Bypass Vulnerability\n\nSECUNIA ADVISORY ID:\nSA47457\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47457/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47457\n\nRELEASE DATE:\n2012-01-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47457/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47457/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47457\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in HP LaserJet P3015, which can be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nThe vulnerability is reported in versions prior to 07.080.3. \n\nSOLUTION:\nUpdate to version 07.080.3. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Digital Defense, Inc. Vulnerability Research Team\n\nORIGINAL ADVISORY:\nHPSBPI02733 SSRT100646:\nhttp://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03140700\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nSolution Description: \n\nAt this time, the vendor has been notified of the vulnerability and has\nreleased a patch which addresses the issue for HP LaserJet P3015. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03140700\nVersion: 1\n\nHPSBPI02733 SSRT100646 rev.1 - Certain HP LaserJet Printers, Remote Unauthorized Access to Files\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2012-01-09\nLast Updated: 2012-01-09\n\nPotential Security Impact: Remote unauthorized access to files\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with certain HP LaserJet printers. The vulnerability could be exploited remotely to gain unauthorized access to files. \n\nReferences: CVE-2011-4785, DDIVRT-2011-37\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP LaserJet P3015 with firmware prior to 07.080.3\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2011-4785    (AV:N/AC:L/Au:N/C:C/I:N/A:N)       7.8\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com. Firmware updates can also be downloaded as follows. \n\nBrowse to www.hp.com/go/support then:\n\nSelect \"Drivers \u0026 Software\"\nEnter the product name listed in the table above into the search field\nClick on \"Search\"\nIf the search returns a list of products click on the appropriate product\nUnder \"Select operating system\" click on \"Cross operating system (BIOS, Firmware, Diagnostics, etc.)\"\nIf the \"Cross operating system ...\" link is not present, select any Windows operating system from the list. \nSelect the appropriate firmware update under \"Firmware\"\n\nHISTORY\nVersion:1 (rev.1) - 9 January 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in the title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk8KzyYACgkQ4B86/C0qfVkUfACg+xhdrs2B1yUnAAvOXn+DgnIw\n+3EAoKpo/OWY5GB47Mi4pgYUVml50iXO\n=tpQT\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "BID",
        "id": "51329"
      },
      {
        "db": "PACKETSTORM",
        "id": "108501"
      },
      {
        "db": "PACKETSTORM",
        "id": "108497"
      },
      {
        "db": "PACKETSTORM",
        "id": "108496"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-4785",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "47457",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "51329",
        "trust": 1.3
      },
      {
        "db": "OSVDB",
        "id": "78224",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037",
        "trust": 0.8
      },
      {
        "db": "BUGTRAQ",
        "id": "20120109 DDIVRT-2011-37 HP JETDIRECT DEVICE PAGE DIRECTORY TRAVERSAL (CVE-2011-4785)",
        "trust": 0.6
      },
      {
        "db": "HP",
        "id": "HPSBPI02733",
        "trust": 0.6
      },
      {
        "db": "HP",
        "id": "SSRT100646",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "18443",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "108501",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "108497",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "108496",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "51329"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "PACKETSTORM",
        "id": "108501"
      },
      {
        "db": "PACKETSTORM",
        "id": "108497"
      },
      {
        "db": "PACKETSTORM",
        "id": "108496"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "id": "VAR-201201-0273",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.25
  },
  "last_update_date": "2023-12-18T12:52:19.300000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBPI02733 SSRT100646",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03140700"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "http://www.securityfocus.com/archive/1/521160"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/47457"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/archive/1/521165"
      },
      {
        "trust": 1.0,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html"
      },
      {
        "trust": 1.0,
        "url": "http://osvdb.org/78224"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/bid/51329"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72227"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4785"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4785"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/18443"
      },
      {
        "trust": 0.3,
        "url": " http://www.phptoys.com/product/micro-news.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/521160"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/521165"
      },
      {
        "trust": 0.2,
        "url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03140700"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4785"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47457/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/jobs/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47457"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47457/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.hp.com/"
      },
      {
        "trust": 0.1,
        "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
      },
      {
        "trust": 0.1,
        "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
      },
      {
        "trust": 0.1,
        "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430"
      },
      {
        "trust": 0.1,
        "url": "https://www.hp.com/go/support"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "51329"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "PACKETSTORM",
        "id": "108501"
      },
      {
        "db": "PACKETSTORM",
        "id": "108497"
      },
      {
        "db": "PACKETSTORM",
        "id": "108496"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "51329"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "db": "PACKETSTORM",
        "id": "108501"
      },
      {
        "db": "PACKETSTORM",
        "id": "108497"
      },
      {
        "db": "PACKETSTORM",
        "id": "108496"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-01-09T00:00:00",
        "db": "BID",
        "id": "51329"
      },
      {
        "date": "2012-01-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "date": "2012-01-09T05:43:08",
        "db": "PACKETSTORM",
        "id": "108501"
      },
      {
        "date": "2012-01-09T22:37:27",
        "db": "PACKETSTORM",
        "id": "108497"
      },
      {
        "date": "2012-01-09T22:36:44",
        "db": "PACKETSTORM",
        "id": "108496"
      },
      {
        "date": "2012-01-10T11:55:05.057000",
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "date": "2012-01-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-01-09T00:00:00",
        "db": "BID",
        "id": "51329"
      },
      {
        "date": "2012-01-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      },
      {
        "date": "2017-08-29T01:30:35.380000",
        "db": "NVD",
        "id": "CVE-2011-4785"
      },
      {
        "date": "2012-01-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  HP Product  HP-ChaiSOE Web Server traversal vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001037"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201201-085"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2012-01-10 11:55
Modified
2024-11-21 01:32
Severity ?
Summary
Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419.
Impacted products
Vendor Product Version
hp hp-chaisoe 1.0
hp laserjet_2430 08.113.0_i35128
hp laserjet_4650 07.006.0
hp laserjet_p3015 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:hp-chaisoe:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1657B3C6-C1E7-4906-B7FC-24C9AC6B231F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:laserjet_2430:08.113.0_i35128:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3D49304-8C2D-4B6C-9CDE-3D39B98C3D82",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:laserjet_4650:07.006.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C175E65-7294-49C2-8F92-3ABE22488FAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:laserjet_p3015:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F451457E-1653-4CB6-B9C2-60F96D8F63EA",
              "versionEndIncluding": "07.080",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en el servidor web HP-ChaiSOE/1.0 en la impresora HP LaserJet P3015 con firmware anterior a v07.080.3, impresora LaserJet 4650 con firmware v07.006.0, e impresora LaserJet 2430 con firmware v08.113.0_I35128 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de vectores de ataque desconocidos, una vulnerabilidad diferente a CVE-2008-4419."
    }
  ],
  "id": "CVE-2011-4785",
  "lastModified": "2024-11-21T01:32:59.993",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-10T11:55:05.057",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://osvdb.org/78224"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://secunia.com/advisories/47457"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/archive/1/521160"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/archive/1/521160"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/archive/1/521165"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/bid/51329"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/47457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/521160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/521160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/521165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72227"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}