CVE-2024-1221

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
Configurations

No configuration.

History

26 Sep 2024, 04:15

Type Values Removed Values Added
Summary
  • (es) Esta vulnerabilidad potencialmente permite que los archivos en un servidor PaperCut NG/MF queden expuestos utilizando un payload formado especĂ­ficamente contra el endpoint API afectado. El atacante debe realizar algĂșn reconocimiento para conocer un token del sistema. Este CVE solo afecta a los servidores PaperCut NG/MF de Linux y macOS.
Summary (en) This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers. (en) This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
CWE CWE-20 CWE-76

14 Mar 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-14 03:15

Updated : 2024-09-26 04:15


NVD link : CVE-2024-1221

Mitre link : CVE-2024-1221

CVE.ORG link : CVE-2024-1221


JSON object : View

Products Affected

No product.

CWE
CWE-76

Improper Neutralization of Equivalent Special Elements