WEPA Print Away does not verify that a user has authorization to access documents before generating print orders and associated release codes. This could allow an attacker to generate print orders and release codes for documents they don´t own and print hem without authorization. In order to exploit this vulnerability, the user must have an account with wepanow.com or any of the institutions they serve, and be logged in.
References
Link | Resource |
---|---|
https://enrique.wtf/CVE-2022-42909 | Third Party Advisory |
https://www.incibe-cert.es/en/early-warning/security-advisories/multiple-vulnerabilities-wepa-print-away | Third Party Advisory |
https://enrique.wtf/CVE-2022-42909 | Third Party Advisory |
https://www.incibe-cert.es/en/early-warning/security-advisories/multiple-vulnerabilities-wepa-print-away | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://enrique.wtf/CVE-2022-42909 - Third Party Advisory | |
References | () https://www.incibe-cert.es/en/early-warning/security-advisories/multiple-vulnerabilities-wepa-print-away - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Information
Published : 2023-02-03 19:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42909
Mitre link : CVE-2022-42909
CVE.ORG link : CVE-2022-42909
JSON object : View
Products Affected
wepanow
- print_away