First published: Tue Jul 25 2023(Updated: )
An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the service from operating as expected.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Papercut Papercut Mf | <22.1.3 | |
Papercut Papercut Ng | <22.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the authentication bypass in PaperCut NG is CVE-2023-3486.
The severity level of CVE-2023-3486 is high with a score of 7.5.
Versions 22.0.12 and prior of PaperCut NG are affected by CVE-2023-3486.
An attacker can exploit CVE-2023-3486 to upload arbitrary files to the PaperCut NG host's file storage, causing resource exhaustion and service disruption.
You can find more information about CVE-2023-3486 at the following references: [https://www.tenable.com/security/research/tra-2023-23](https://www.tenable.com/security/research/tra-2023-23) and [https://www.papercut.com/kb/Main/SecurityBulletinJuly2023/](https://www.papercut.com/kb/Main/SecurityBulletinJuly2023/).