CVE-2023-27350 Scanner
Detects 'Remote Code Execution (RCE)' vulnerability in PaperCut NG affects v. 22.0.5 (Build 63914).
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 2 days
Scan only one
Domain, IPv4
Toolbox
-
PaperCut NG is a print management software used by many small and large organizations around the world to control, monitor and report on their printing activities. It is a feature-rich solution that ensures the secure and efficient management of printing resources and reduces printing costs. PaperCut NG allows users to track and restrict printing, scanning, and copying activities, set quotas, and provide secure mobile printing options.
Recently, a severe security flaw has been detected in PaperCut NG, which has been identified as CVE-2023-27350. This vulnerability pertains to a flaw in the SetupCompleted class, which allows unauthorized users to bypass authentication and execute arbitrary code in the context of SYSTEM. The vulnerability arises from inadequate access control measures that are employed by the software.
When exploited, the CVE-2023-27350 vulnerability can have dire consequences as it provides unauthorized users with complete control over the system. An attacker leveraging this vulnerability can not only bypass authentication, but also gain access to confidential and sensitive information stored on the system, and possibly launch further attacks like installing malware or compromising other hosts in the network. This could result in data loss, system downtime, and a significant financial loss to the organization.
In conclusion, security is critical for any organization, and it is crucial to remain vigilant in the face of emerging vulnerabilities. Thanks to the pro features of s4e.io, users can stay up-to-date on the latest security threats and vulnerabilities in their digital assets, enabling them to take preventative measures before it's too late. Stay secure.
REFERENCES
- http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html
- http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html
- https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/
- https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
- https://www.zerodayinitiative.com/advisories/ZDI-23-233/