CVE-2024-1221

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
Configurations

No configuration.

History

21 Nov 2024, 08:50

Type Values Removed Values Added
References () https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 - () https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 -

26 Sep 2024, 04:15

Type Values Removed Values Added
CWE CWE-20 CWE-76
Summary
  • (es) Esta vulnerabilidad potencialmente permite que los archivos en un servidor PaperCut NG/MF queden expuestos utilizando un payload formado específicamente contra el endpoint API afectado. El atacante debe realizar algún reconocimiento para conocer un token del sistema. Este CVE solo afecta a los servidores PaperCut NG/MF de Linux y macOS.
Summary (en) This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers. (en) This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.

14 Mar 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-14 03:15

Updated : 2024-11-21 08:50


NVD link : CVE-2024-1221

Mitre link : CVE-2024-1221

CVE.ORG link : CVE-2024-1221


JSON object : View

Products Affected

No product.

CWE
CWE-76

Improper Neutralization of Equivalent Special Elements