PaperCut NG Path Traversal Vulnerability Allows Remote Code Execution
CVE-2023-39143
9.8CRITICAL
Summary
PaperCut NG and PaperCut MF prior to version 22.1.3 on Windows are susceptible to a path traversal vulnerability. This flaw permits unauthorized users to manipulate file paths, enabling them to upload, read, or delete arbitrary files on the server. When external device integration features are enabled, which is a frequently adopted configuration, this can culminate in remote code execution. Organizations using affected versions should take immediate action to mitigate risks by applying the latest security patches.
References
EPSS Score
88% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved