By default JetAdmin Web Interface Server listens on port 8000. By requesting a specially formed URL which includes "../" it is possible for a remote user to gain read-access to any files outside of the web-published directory.
HP Web JetAdmin wja Traversal Arbitrary File Access
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
HP JetAdmin contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the "wja" script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "page" variable.
Upgrade to version 6.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.