CVE-2023-4568

PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.
References
Link Resource
https://www.tenable.com/security/research/tra-2023-31 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2023-31 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:35

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2023-31 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2023-31 - Exploit, Third Party Advisory

15 Sep 2023, 16:20

Type Values Removed Values Added
CWE CWE-287
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Papercut papercut Ng
Papercut
CPE cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*
References (MISC) https://www.tenable.com/security/research/tra-2023-31 - (MISC) https://www.tenable.com/security/research/tra-2023-31 - Exploit, Third Party Advisory

14 Sep 2023, 13:01

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-13 21:15

Updated : 2024-11-21 08:35


NVD link : CVE-2023-4568

Mitre link : CVE-2023-4568

CVE.ORG link : CVE-2023-4568


JSON object : View

Products Affected

papercut

  • papercut_ng
CWE
CWE-287

Improper Authentication