First published: Thu Apr 20 2023(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Papercut Papercut Mf | >=15.0.0<20.1.7 | |
Papercut Papercut Mf | >=21.0.0<21.2.11 | |
Papercut Papercut Mf | >=22.0.0<22.0.9 | |
Papercut Papercut Ng | >=15.0.0<20.1.7 | |
Papercut Papercut Ng | >=21.0.0<21.2.11 | |
Papercut Papercut Ng | >=22.0.0<22.0.9 | |
PaperCut NG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27351 is a vulnerability that allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914).
The severity of CVE-2023-27351 is high with a CVSS score of 8.2.
CVE-2023-27351 affects Papercut Mf versions between 15.0.0 and 20.1.7, Papercut Ng versions between 15.0.0 and 20.1.7, Papercut Mf versions between 21.0.0 and 21.2.11, Papercut Ng versions between 21.0.0 and 21.2.11, Papercut Mf versions between 22.0.0 and 22.0.9, and Papercut Ng versions between 22.0.0 and 22.0.9.
To exploit CVE-2023-27351, remote attackers can bypass authentication without needing any credentials.
No, authentication is not required to exploit CVE-2023-27351.