HomePentest-Tools.com Logo

PaperCut - Unauthenticated Remote Code Execution (CVE-2023-27350)

Severity
CVSSv3 Score
9.8
Vulnerability description

PaperCut is vulnerable to CVE-2023-27350, an Authentication Bypass vulnerability in the SetupCompleted class. The root cause of this vulnerability is improper sanitization of user-provided input. This vulnerability allows a remote unauthenticated attacker to bypass authentication and execute commands within the SYSTEM context.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.

Recommendation

Update the PaperCut server to one of the current fixed versions: 20.1.7, 21.2.11, 22.0.9, 20.1.7, 21.2.11, 22.0.9.

Codename
Not available
Detectable with
Network Scanner
Exploitable with Sniper
Yes
Vuln date
Apr 2023
Published at
Updated at
Software Type
Printing Service
Vendor
PaperCut
Product
PaperCut NG/MF