PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2023-31 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2023-31 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2023-31 - Exploit, Third Party Advisory |
15 Sep 2023, 16:20
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Papercut papercut Ng
Papercut |
|
CPE | cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.tenable.com/security/research/tra-2023-31 - Exploit, Third Party Advisory |
14 Sep 2023, 13:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-13 21:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4568
Mitre link : CVE-2023-4568
CVE.ORG link : CVE-2023-4568
JSON object : View
Products Affected
papercut
- papercut_ng
CWE
CWE-287
Improper Authentication