First published: Wed Sep 20 2023(Updated: )
The `PaperCutNG Mobility Print` version 1.0.3512 application allows an unauthenticated attacker to perform a CSRF attack on an instance administrator to configure the clients host (in the "configure printer discovery" section). This is possible because the application has no protections against CSRF attacks, like Anti-CSRF tokens, header origin validation, samesite cookies, etc.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Papercut Mobility Print Server | =1.0.3512 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2508.
The severity of CVE-2023-2508 is medium.
An attacker can exploit CVE-2023-2508 by performing a CSRF attack on an instance administrator to configure the client's host in the "configure printer discovery" section.
Version 1.0.3512 of PaperCutNG Mobility Print is affected by CVE-2023-2508.
No, Apple macOS is not affected by CVE-2023-2508.
To fix CVE-2023-2508, update to a version of PaperCutNG Mobility Print that includes a fix for this vulnerability.
You can find more information about CVE-2023-2508 in the following references: [Fluid Attacks Advisory](https://fluidattacks.com/advisories/solveig/) and [PaperCutNG Mobility Print Release History](https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server).
The CWE ID for this vulnerability is CWE-352.