PaperCut NG Path Traversal Vulnerability Allows Remote Code Execution
CVE-2023-39143

9.8CRITICAL

Key Information:

Vendor
PaperCut
Vendor
CVE Published:
4 August 2023

Summary

PaperCut NG and PaperCut MF prior to version 22.1.3 on Windows are susceptible to a path traversal vulnerability. This flaw permits unauthorized users to manipulate file paths, enabling them to upload, read, or delete arbitrary files on the server. When external device integration features are enabled, which is a frequently adopted configuration, this can culminate in remote code execution. Organizations using affected versions should take immediate action to mitigate risks by applying the latest security patches.

References

EPSS Score

88% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.