CVE-2008-4419
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
05/02/2009
Last modified:
09/04/2025
Description
Directory traversal vulnerability in the HP JetDirect web administration interface in the HP-ChaiSOE 1.0 embedded web server on the LaserJet 9040mfp, LaserJet 9050mfp, and Color LaserJet 9500mfp before firmware 08.110.9; LaserJet 4345mfp and 9200C Digital Sender before firmware 09.120.9; Color LaserJet 4730mfp before firmware 46.200.9; LaserJet 2410, LaserJet 2420, and LaserJet 2430 before firmware 20080819 SPCL112A; LaserJet 4250 and LaserJet 4350 before firmware 20080819 SPCL015A; and LaserJet 9040 and LaserJet 9050 before firmware 20080819 SPCL110A allows remote attackers to read arbitrary files via directory traversal sequences in the URI.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:hp:9200c_digital_sender:*:*:*:*:*:*:*:* | 20081211_09.131.1 (including) | |
| cpe:2.3:h:hp:color_laserjet_4370mfp:*:*:*:*:*:*:*:* | 20081211_46.211.2 (including) | |
| cpe:2.3:h:hp:color_laserjet_9500mfp:*:*:*:*:*:*:*:* | 20070719_05.011.2 (including) | |
| cpe:2.3:h:hp:laserjet_2410:*:*:*:*:*:*:*:* | 20070410_08.112.3 (including) | |
| cpe:2.3:h:hp:laserjet_2420:*:*:*:*:*:*:*:* | 20070410_08.112.3 (including) | |
| cpe:2.3:h:hp:laserjet_2430:*:*:*:*:*:*:*:* | 20070410_08.112.3 (including) | |
| cpe:2.3:h:hp:laserjet_4250:*:*:*:*:*:*:*:* | 20080319_08.015.0 (including) | |
| cpe:2.3:h:hp:laserjet_4345mfp:*:*:*:*:*:*:*:* | 20081211_09.131.1 (including) | |
| cpe:2.3:h:hp:laserjet_4350:*:*:*:*:*:*:*:* | 20080319_08.015.0 (including) | |
| cpe:2.3:h:hp:laserjet_9040:*:*:*:*:*:*:*:* | 20080204_08.110.0 (including) | |
| cpe:2.3:h:hp:laserjet_9040mfp:*:*:*:*:*:*:*:* | 20080204_08.110.0 (including) | |
| cpe:2.3:h:hp:laserjet_9050:*:*:*:*:*:*:*:* | 20080204_08.110.0 (including) | |
| cpe:2.3:h:hp:laserjet_9050mfp:*:*:*:*:*:*:*:* | 20080204_08.110.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905
- http://secunia.com/advisories/33779
- http://www.securityfocus.com/archive/1/500657/100/0/threaded
- http://www.securityfocus.com/bid/33611
- http://www.securitytracker.com/id?1021687=
- http://www.vupen.com/english/advisories/2009/0341
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905
- http://secunia.com/advisories/33779
- http://www.securityfocus.com/archive/1/500657/100/0/threaded
- http://www.securityfocus.com/bid/33611
- http://www.securitytracker.com/id?1021687=
- http://www.vupen.com/english/advisories/2009/0341



