Page 3 of 26 results (0.009 seconds)

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers. Esta vulnerabilidad potencialmente permite que los archivos en un servidor PaperCut NG/MF queden expuestos utilizando un payload formado específicamente contra el endpoint API afectado. El atacante debe realizar algún reconocimiento para conocer un token del sistema. • https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 • CWE-20: Improper Input Validation CWE-76: Improper Neutralization of Equivalent Special Elements •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must be able to write into the local C Drive. In addition, the attacker must have admin privileges to enable Print Archiving or encounter a misconfigured system. This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. This specific flaw exists within the pc-pdl-to-image process. • https://www.papercut.com/kb/Main/CommonSecurityQuestions https://www.papercut.com/kb/Main/Security-Bulletin-November-2023 • CWE-250: Execution with Unnecessary Privileges CWE-269: Improper Privilege Management •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with "GET /ui/static/..//.." reach getStaticContent in UIContentResource.class in the static-content-files servlet. Existe una vulnerabilidad de Path Traversal en PaperCut NG anterior a 22.1.1 y PaperCut MF anterior a 22.1.1. En condiciones específicas, esto podría permitir que un atacante autenticado obtenga acceso de solo lectura al sistema de archivos del servidor, porque las solicitudes que comienzan con "GET /ui/static/..//.." alcanza getStaticContent en UIContentResource.class en el servlet static-content-files. • https://research.aurainfosec.io/disclosure/papercut https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications https://www.papercut.com/kb/Main/SecurityBulletinJune2023 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

The `PaperCutNG Mobility Print` version 1.0.3512 application allows an unauthenticated attacker to perform a CSRF attack on an instance administrator to configure the clients host (in the "configure printer discovery" section). This is possible because the application has no protections against CSRF attacks, like Anti-CSRF tokens, header origin validation, samesite cookies, etc. La aplicación `PaperCutNG Mobility Print` versión 1.0.3512 permite que un atacante no autenticado realice un ataque CSRF en un administrador de instancia para configurar el anfitrión del cliente (en la sección "configurar descubrimiento de impresora"). Esto es posible porque la aplicación no tiene protecciones contra ataques CSRF, como tokens Anti-CSRF, validación del origen del encabezado, cookies del mismo sitio, etc. • https://fluidattacks.com/advisories/solveig https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 1%CPEs: 1EXPL: 2

PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch. PaperCut NG permite ejecutar comandos XMLRPC no autenticados de forma predeterminada. Se confirma que las versiones 22.0.12 e inferiores están afectadas, pero las versiones posteriores también pueden verse afectadas debido a la falta de un parche proporcionado por el proveedor. • https://github.com/Cappricio-Securities/CVE-2023-4568 https://www.tenable.com/security/research/tra-2023-31 • CWE-287: Improper Authentication •