Vulnerabilites related to PaperCut - PaperCut NG, PaperCut MF
cve-2024-1223
Vulnerability from cvelistv5
Published
2024-03-14 03:04
Modified
2024-09-26 03:50
Severity ?
EPSS score ?
Summary
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-1223", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-14T15:32:53.951317Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:01:22.597Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:33:25.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux", "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state." } ], "value": "This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-488", "description": "CWE-488: Exposure of Data Element to Wrong Session", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:50:15.610Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper authorization controls in PaperCut NG/MF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1223", "datePublished": "2024-03-14T03:04:43.588Z", "dateReserved": "2024-02-05T04:34:01.599Z", "dateUpdated": "2024-09-26T03:50:15.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8404
Vulnerability from cvelistv5
Published
2024-09-26 01:42
Modified
2024-09-26 15:01
Severity ?
EPSS score ?
Summary
An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder.
Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server.
Note:
This CVE has been split from CVE-2024-3037.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.9 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "papercut_mf", "vendor": "papercut", "versions": [ { "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "papercut_ng", "vendor": "papercut", "versions": [ { "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-8404", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T14:59:11.788417Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T15:01:21.951Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Web Print" ], "platforms": [ "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.9", "status": "unaffected" } ], "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amol Dosanjh of Trend Micro" }, { "lang": "en", "type": "finder", "value": "Nicholas Zubrisky (@NZubrisky) of Trend Micro" }, { "lang": "en", "type": "finder", "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s ZDI" } ], "datePublic": "2024-09-26T01:35:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eAn arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eImportant: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eNote: \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis CVE has been split from CVE-2024-3037.\u003c/span\u003e\u003c/p\u003e\u003cbr\u003e" } ], "value": "An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. \n\nImportant: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server.\n\nNote: \n\nThis CVE has been split from CVE-2024-3037." } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T01:42:49.400Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary File Deletion in PaperCut NG/MF Web Print Hot folder", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-8404", "datePublished": "2024-09-26T01:42:49.400Z", "dateReserved": "2024-09-04T05:55:44.460Z", "dateUpdated": "2024-09-26T15:01:21.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4712
Vulnerability from cvelistv5
Published
2024-05-14 00:13
Modified
2024-09-26 01:27
Severity ?
EPSS score ?
Summary
An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the image-handler process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can lead to local privilege escalation.
Note:
This CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4712", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-20T19:40:02.500241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-20T19:40:12.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:47:41.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/security-bulletin-may-2024/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Web Print" ], "platforms": [ "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.9", "status": "unaffected" } ], "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Nicholas Zubrisky (@NZubrisky) of Trend Micro Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eAn arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled.\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis specific flaw exists within the image-handler process, which can incorrectly create files that don\u2019t exist when a maliciously formed payload is provided. This can lead to local privilege escalation.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eNote: \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it\u2019s been rescored \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003ewith a \"Privileges Required (PR)\" rating of low, and \u201cAttack Complexity (AC)\u201d rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.\u003c/span\u003e\u003c/p\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled.\u00a0This specific flaw exists within the image-handler process, which can incorrectly create files that don\u2019t exist when a maliciously formed payload is provided. This can lead to local privilege escalation.\n\nNote: \n\nThis CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it\u2019s been rescored with a \"Privileges Required (PR)\" rating of low, and \u201cAttack Complexity (AC)\u201d rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server." } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T01:27:50.169Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary File Creation in PaperCut NG/MF Web Print Image Handler", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-4712", "datePublished": "2024-05-14T00:13:47.600Z", "dateReserved": "2024-05-10T05:15:31.461Z", "dateUpdated": "2024-09-26T01:27:50.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3037
Vulnerability from cvelistv5
Published
2024-05-14 00:12
Modified
2024-10-07 20:27
Severity ?
EPSS score ?
Summary
An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server.
Important: In most installations, this risk is mitigated by the default Windows Server configuration, which typically restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log in to the local console of the Windows environment hosting the PaperCut NG/MF application server.
Note: This CVE has been split into two separate CVEs (CVE-2024-3037 and CVE-2024-8404) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard users on the host server.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T19:32:42.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/security-bulletin-may-2024/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "papercut_ng", "vendor": "papercut", "versions": [ { "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "papercut_mf", "vendor": "papercut", "versions": [ { "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3037", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-07T20:25:16.955265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-07T20:27:00.841Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Web Print" ], "platforms": [ "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.9", "status": "unaffected" } ], "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Nicholas Zubrisky (@NZubrisky)" }, { "lang": "en", "type": "finder", "value": "Michael DePlante(@izobashi) of Trend Micro\u0027s ZDI" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eAn arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server. \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eImportant: In most installations, this risk is mitigated by the default Windows Server configuration, which typically restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log in to the local console of the Windows environment hosting the PaperCut NG/MF application server.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eNote: This CVE has been split into two separate CVEs (CVE-2024-3037 and CVE-2024-8404) and it\u2019s been rescored with a \"Privileges Required (PR)\" rating of low, and \u201cAttack Complexity (AC)\u201d rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard users on the host server.\u003c/span\u003e\u003c/p\u003e" } ], "value": "An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server. \n\nImportant: In most installations, this risk is mitigated by the default Windows Server configuration, which typically restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log in to the local console of the Windows environment hosting the PaperCut NG/MF application server.\n\nNote: This CVE has been split into two separate CVEs (CVE-2024-3037 and CVE-2024-8404) and it\u2019s been rescored with a \"Privileges Required (PR)\" rating of low, and \u201cAttack Complexity (AC)\u201d rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard users on the host server." } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T01:15:01.885Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary File Deletion in PaperCut NG/MF Web Print", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-3037", "datePublished": "2024-05-14T00:12:37.696Z", "dateReserved": "2024-03-28T04:33:02.602Z", "dateUpdated": "2024-10-07T20:27:00.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1884
Vulnerability from cvelistv5
Published
2024-03-14 03:11
Modified
2024-08-28 15:12
Severity ?
EPSS score ?
Summary
This is a Server-Side Request Forgery (SSRF) vulnerability in the PaperCut NG/MF server-side module that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T18:56:22.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_ng", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_mf", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1884", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-14T15:43:10.845115Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T15:12:02.085Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux", "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This is a Server-Side Request Forgery (SSRF) vulnerability in the PaperCut NG/MF server-side module that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker\u0027s choosing." } ], "value": "This is a Server-Side Request Forgery (SSRF) vulnerability in the PaperCut NG/MF server-side module that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker\u0027s choosing." } ], "impacts": [ { "capecId": "CAPEC-664", "descriptions": [ { "lang": "en", "value": "CAPEC-664 Server-Side Request Forgery (SSRF)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-14T03:11:48.197Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Server Side Request Forgery in PaperCut NG/MF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1884", "datePublished": "2024-03-14T03:11:48.197Z", "dateReserved": "2024-02-26T05:36:24.198Z", "dateUpdated": "2024-08-28T15:12:02.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8405
Vulnerability from cvelistv5
Published
2024-09-26 01:36
Modified
2024-09-26 15:02
Severity ?
EPSS score ?
Summary
An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the web-print.exe process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can be used to flood disk space and result in a Denial of Service (DoS) attack.
Note:
This CVE has been split from CVE-2024-4712.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8405", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T15:01:57.724249Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T15:02:10.145Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Web Print" ], "platforms": [ "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.9", "status": "unaffected" } ], "lessThan": "23.0.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amol Dosanjh of Trend Micro" } ], "datePublic": "2024-09-26T01:35:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eAn arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis specific flaw exists within the web-print.exe process, which can incorrectly create files that don\u2019t exist when a maliciously formed payload is provided. This can be used to flood disk space and result in a Denial of Service (DoS) attack.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eNote: \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis CVE has been split from CVE-2024-4712.\u003c/span\u003e\u003c/p\u003e" } ], "value": "An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the web-print.exe process, which can incorrectly create files that don\u2019t exist when a maliciously formed payload is provided. This can be used to flood disk space and result in a Denial of Service (DoS) attack.\n\nNote: \n\nThis CVE has been split from CVE-2024-4712." } ], "impacts": [ { "capecId": "CAPEC-125", "descriptions": [ { "lang": "en", "value": "CAPEC-125 Flooding" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T01:36:26.364Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary File Creation in PaperCut NG/MF Web Print leading to a Denial of Service attack", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-8405", "datePublished": "2024-09-26T01:36:26.364Z", "dateReserved": "2024-09-04T05:55:45.849Z", "dateUpdated": "2024-09-26T15:02:10.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1221
Vulnerability from cvelistv5
Published
2024-03-14 03:01
Modified
2024-09-26 03:46
Severity ?
EPSS score ?
Summary
This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-1221", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T15:25:34.441612Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:59:42.267Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:33:25.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eThis vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.\u003c/span\u003e\u003cbr\u003e" } ], "value": "This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-76", "description": "CWE-76 Improper Neutralization of Equivalent Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:46:19.820Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper access controls on APIs on Linux and macOS in PaperCut NG/MF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1221", "datePublished": "2024-03-14T03:01:05.179Z", "dateReserved": "2024-02-05T04:33:58.615Z", "dateUpdated": "2024-09-26T03:46:19.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1222
Vulnerability from cvelistv5
Published
2024-03-14 03:03
Modified
2024-09-26 03:50
Severity ?
EPSS score ?
Summary
This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T18:33:25.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_mf", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_ng", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1222", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-26T04:00:45.176980Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T15:10:56.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux", "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.\u003cbr\u003e\u003cbr\u003e" } ], "value": "This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250: Execution with Unnecessary Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:50:54.624Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incorrect authorization controls in PaperCut NG/MF APIs", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1222", "datePublished": "2024-03-14T03:03:18.638Z", "dateReserved": "2024-02-05T04:34:00.207Z", "dateUpdated": "2024-09-26T03:50:54.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1654
Vulnerability from cvelistv5
Published
2024-03-14 03:06
Modified
2024-08-01 18:48
Severity ?
EPSS score ?
Summary
This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_mf", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_ng", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1654", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-16T04:00:54.272578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T16:04:21.347Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:48:21.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux", "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this. " } ], "value": "This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this. " } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-183", "description": "CWE-183 Permissive List of Allowed Inputs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-14T03:06:54.867Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthorized write operations in PaperCut NG/MF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1654", "datePublished": "2024-03-14T03:06:54.867Z", "dateReserved": "2024-02-20T02:23:09.252Z", "dateUpdated": "2024-08-01T18:48:21.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6006
Vulnerability from cvelistv5
Published
2023-11-14 04:04
Modified
2025-01-08 16:44
Severity ?
EPSS score ?
Summary
This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must have local write access to the C Drive. In addition, Print Archiving must be enabled or the attacker needs to encounter a misconfigured system. This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. This specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM
Note: This CVE has been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:25.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-November-2023/" }, { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/CommonSecurityQuestions/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6006", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-30T18:23:10.697416Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T16:44:47.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Print Archiving" ], "platforms": [ "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.0", "status": "unaffected" } ], "lessThan": "23.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amol Dosanjh of Trend Micro" }, { "lang": "en", "type": "finder", "value": "Michael DePlante(@izobashi) of Trend Micro\u0027s ZDI" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003eAn attacker must have local write access to the C Drive. In addition, Print Archiving must be enabled or the attacker needs to encounter a misconfigured system.\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003e This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eNote: This CVE has been rescored with a \"Privileges Required (PR)\" rating of low, and \u201cAttack Complexity (AC)\u201d rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.\u003c/span\u003e\u003c/p\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must have local write access to the C Drive. In addition, Print Archiving must be enabled or the attacker needs to encounter a misconfigured system. This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. This specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM\n\nNote: This CVE has been rescored with a \"Privileges Required (PR)\" rating of low, and \u201cAttack Complexity (AC)\u201d rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250 Execution with Unnecessary Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T01:19:25.248Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-November-2023/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Privilege Escalation Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2023-6006", "datePublished": "2023-11-14T04:04:03.280Z", "dateReserved": "2023-11-08T04:55:38.051Z", "dateUpdated": "2025-01-08T16:44:47.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1883
Vulnerability from cvelistv5
Published
2024-03-14 03:09
Modified
2024-09-26 03:43
Severity ?
EPSS score ?
Summary
This is a reflected cross site scripting vulnerability in the PaperCut NG/MF application server. An attacker can exploit this weakness by crafting a malicious URL that contains a script. When an unsuspecting user clicks on this malicious link, it could potentially lead to limited loss of confidentiality, integrity or availability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-1883", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T15:24:48.682883Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:00:09.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:56:22.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux", "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This is a reflected cross site scripting vulnerability in the PaperCut NG/MF application server. An attacker can exploit this weakness by crafting a malicious URL that contains a script. When an unsuspecting user clicks on this malicious link, it could potentially lead to limited loss of confidentiality, integrity or availability." } ], "value": "This is a reflected cross site scripting vulnerability in the PaperCut NG/MF application server. An attacker can exploit this weakness by crafting a malicious URL that contains a script. When an unsuspecting user clicks on this malicious link, it could potentially lead to limited loss of confidentiality, integrity or availability." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-76", "description": "CWE-76 Improper Neutralization of Equivalent Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:43:04.535Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Reflected XSS in PaperCut NG/MF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1883", "datePublished": "2024-03-14T03:09:43.195Z", "dateReserved": "2024-02-26T05:36:23.133Z", "dateUpdated": "2024-09-26T03:43:04.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1882
Vulnerability from cvelistv5
Published
2024-03-14 03:08
Modified
2024-09-26 03:52
Severity ?
EPSS score ?
Summary
This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PaperCut | PaperCut NG, PaperCut MF |
Version: 0 < 23.0.7 Version: 0 < 22.1.5 Version: 0 < 21.2.14 Version: 0 < 20.1.10 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_ng", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "papercut_mf", "vendor": "papercut", "versions": [ { "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1882", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-16T04:00:55.398174Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T16:02:52.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:56:22.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "MacOS", "Linux", "Windows" ], "product": "PaperCut NG, PaperCut MF", "vendor": "PaperCut", "versions": [ { "changes": [ { "at": "23.0.7", "status": "unaffected" } ], "lessThan": "23.0.7", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "22.1.5", "status": "unaffected" } ], "lessThan": "22.1.5", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "21.2.14", "status": "unaffected" } ], "lessThan": "21.2.14", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "20.1.10", "status": "unaffected" } ], "lessThan": "20.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.\u003cbr\u003e" } ], "value": "This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server." } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-76", "description": "CWE-76 Improper Neutralization of Equivalent Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:52:57.154Z", "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "shortName": "PaperCut" }, "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024" } ], "source": { "discovery": "UNKNOWN" }, "title": "Server-side resource injection in PaperCut NG/MF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "assignerShortName": "PaperCut", "cveId": "CVE-2024-1882", "datePublished": "2024-03-14T03:08:17.914Z", "dateReserved": "2024-02-26T05:36:21.950Z", "dateUpdated": "2024-09-26T03:52:57.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }