PaperCut NG print.script.sandboxed Exposed Dangerous Function Remote Code Execution Vulnerability
CVE-2023-39470
7.2HIGH
Summary
A significant vulnerability exists within PaperCut NG related to the management of the print.script.sandboxed setting. This issue allows unauthenticated remote attackers to exploit a dangerous function, which can result in the execution of arbitrary code within the context of the SYSTEM user. This flaw necessitates that appropriate security measures are implemented by users of affected PaperCut NG installations to mitigate potential exploitation risks. For further details, refer to the security bulletins from the vendor and advisories from cybersecurity researchers.
Affected Version(s)
NG 22.0.10 65996
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved