File: 2548.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (67 lines) | stat: -rw-r--r-- 1,825 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid:
2548

--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with the web interface support for the HP JetAdmin printer.

--
Impact:
A successful attack may allow unauthorized files to be read or the injection 
of a .hts script on a vulnerable server.

--
Detailed Information:
The HP Web JetAdmin provides a web interface for the administration of the HP
Web JetAdmin printer.  A vulnerability exists that allows unauthorized
files to be read or a .hts script to be executed.  This is caused when the
/plugins/hpjdwm/script/test/setinfo.hts script is supplied a value to the
setinclude parameter that represents an unauthorized file to be read outside
the web root or represents a .hts file that will be executed with system
privileges on the vulnerable server. 

--
Affected Systems:
HP Web JetAdmin 7.2.

--
Attack Scenarios:
An attacker can execute the vulnerable script and supply a value to setinclude
indicating an unauthorized file to be read or an .hts file to be executed. 

--
Ease of Attack:
Simple. 

--
False Positives:
An authorized administrator who uses the setinclude parameter with the above
script from a source IP outside of the trusted network will cause a false positive alert.

--
False Negatives:
The default HP Web JetAdmin port is 8000.  If an administrator selects a different port
on which to run the web interface, no alert will be detected.  In that case, the rule
should be altered to reflect the port on which the web interface runs.

--
Corrective Action:
Upgrade to the latest non-affected version of the software or apply the appropriate patch
when it becomes available.

--
Contributors:
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References

Bugtraq:
http://www.securityfocus.com/bid/9972

--