PaperCut NG print.script.sandboxed Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability.
The specific flaw exists within the management of the print.script.sandboxed setting. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20965.
References
Link | Resource |
---|---|
https://www.papercut.com/kb/Main/SecurityBulletinJune2023/ | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-786/ | Third Party Advisory |
Configurations
History
09 Jan 2025, 15:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Papercut papercut Ng
Papercut |
|
References | () https://www.papercut.com/kb/Main/SecurityBulletinJune2023/ - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-786/ - Third Party Advisory |
Information
Published : 2024-11-22 20:15
Updated : 2025-01-09 15:46
NVD link : CVE-2023-39470
Mitre link : CVE-2023-39470
CVE.ORG link : CVE-2023-39470
JSON object : View
Products Affected
papercut
- papercut_ng
CWE