mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
Update printers-info-leak template with improved metadata and structure
- Added proper impact and remediation sections - Enhanced description with PJL context - Added vendor and product metadata fields - Added shodan-query for better discoverability - Added pjl tag for better categorization - Added additional reference for PJL documentation - Enhanced template structure following review guidelines
This commit is contained in:
@@ -5,12 +5,20 @@ info:
|
||||
author: pussycat0x
|
||||
severity: info
|
||||
description: |
|
||||
Unauthorized access to printers allows attackers to print, eavesdrop sensitive documents.
|
||||
Unauthorized access to printers allows attackers to print, eavesdrop on sensitive documents, and potentially execute commands through PJL (Printer Job Language).
|
||||
impact: |
|
||||
Attackers can gain access to sensitive printed documents, manipulate print jobs, and potentially compromise printer security.
|
||||
remediation: |
|
||||
Implement proper network segmentation, disable unnecessary printer services, and ensure printers are not directly accessible from untrusted networks.
|
||||
reference:
|
||||
- https://book.hacktricks.xyz/pentesting/9100-pjl
|
||||
- https://en.wikipedia.org/wiki/Printer_Job_Language
|
||||
metadata:
|
||||
max-request: 1
|
||||
tags: network,iot,printer,misconfig,tcp
|
||||
vendor: generic
|
||||
product: printer
|
||||
shodan-query: port:9100
|
||||
tags: network,iot,printer,misconfig,tcp,pjl
|
||||
tcp:
|
||||
- inputs:
|
||||
- data: "@PJL INFO ID\n"
|
||||
|
||||
Reference in New Issue
Block a user