Update printers-info-leak template with improved metadata and structure

- Added proper impact and remediation sections
- Enhanced description with PJL context
- Added vendor and product metadata fields
- Added shodan-query for better discoverability
- Added pjl tag for better categorization
- Added additional reference for PJL documentation
- Enhanced template structure following review guidelines
This commit is contained in:
Prince Chaddha
2025-07-15 18:28:02 +04:00
parent cf67502739
commit d0ddecfadc

View File

@@ -5,12 +5,20 @@ info:
author: pussycat0x
severity: info
description: |
Unauthorized access to printers allows attackers to print, eavesdrop sensitive documents.
Unauthorized access to printers allows attackers to print, eavesdrop on sensitive documents, and potentially execute commands through PJL (Printer Job Language).
impact: |
Attackers can gain access to sensitive printed documents, manipulate print jobs, and potentially compromise printer security.
remediation: |
Implement proper network segmentation, disable unnecessary printer services, and ensure printers are not directly accessible from untrusted networks.
reference:
- https://book.hacktricks.xyz/pentesting/9100-pjl
- https://en.wikipedia.org/wiki/Printer_Job_Language
metadata:
max-request: 1
tags: network,iot,printer,misconfig,tcp
vendor: generic
product: printer
shodan-query: port:9100
tags: network,iot,printer,misconfig,tcp,pjl
tcp:
- inputs:
- data: "@PJL INFO ID\n"