First published: Thu Apr 20 2023(Updated: )
PaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Papercut Papercut Mf | >=8.0.0<20.1.7 | |
Papercut Papercut Mf | >=21.0.0<21.2.11 | |
Papercut Papercut Mf | >=22.0.0<22.0.9 | |
Papercut Papercut Ng | >=8.0.0<20.1.7 | |
Papercut Papercut Ng | >=21.0.0<21.2.11 | |
Papercut Papercut Ng | >=22.0.0<22.0.9 | |
PaperCut MF/NG | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27350 is an improper access control vulnerability found in PaperCut MF/NG.
The impact of CVE-2023-27350 is authentication bypass and code execution in the context of the system.
CVE-2023-27350 affects PaperCut MF/NG by allowing an attacker to bypass authentication and execute code on the system.
To fix CVE-2023-27350, apply the necessary security patches provided by PaperCut and ensure that you are running the latest version of PaperCut MF/NG.
More information about CVE-2023-27350 can be found in the official knowledge base article provided by PaperCut: https://www.papercut.com/kb/Main/PO-1216-and-PO-1219