PaperCut - Unauthenticated Remote Code Execution (CVE-2023-27350)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
PaperCut is vulnerable to CVE-2023-27350, an Authentication Bypass vulnerability in the SetupCompleted class. The root cause of this vulnerability is improper sanitization of user-provided input. This vulnerability allows a remote unauthenticated attacker to bypass authentication and execute commands within the SYSTEM context.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Update the PaperCut server to one of the current fixed versions: 20.1.7, 21.2.11, 22.0.9, 20.1.7, 21.2.11, 22.0.9.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Apr 2023
- Published at
- Updated at
- Software Type
- Printing Service
- Vendor
- PaperCut
- Product
- PaperCut NG/MF