A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with "GET /ui/static/..//.." reach getStaticContent in UIContentResource.class in the static-content-files servlet.
References
Link | Resource |
---|---|
https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications | Vendor Advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJune2023 | Vendor Advisory |
https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications | Vendor Advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJune2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://research.aurainfosec.io/disclosure/papercut/ - Third Party Advisory | |
References | () https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ - Third Party Advisory | |
References | () https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications - Vendor Advisory | |
References | () https://www.papercut.com/kb/Main/SecurityBulletinJune2023 - Vendor Advisory |
26 Oct 2023, 17:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-22 | |
First Time |
Papercut papercut Mf
Papercut papercut Ng Papercut |
|
References | (MISC) https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ - Third Party Advisory | |
References | (MISC) https://www.papercut.com/kb/Main/SecurityBulletinJune2023 - Vendor Advisory | |
References | (MISC) https://research.aurainfosec.io/disclosure/papercut/ - Third Party Advisory | |
References | (MISC) https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications - Vendor Advisory | |
CPE | cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* |
20 Oct 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with "GET /ui/static/..//.." reach getStaticContent in UIContentResource.class in the static-content-files servlet. |
19 Oct 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-19 14:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31046
Mitre link : CVE-2023-31046
CVE.ORG link : CVE-2023-31046
JSON object : View
Products Affected
papercut
- papercut_ng
- papercut_mf
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')