First published: Fri May 03 2024(Updated: )
PaperCut NG External User Lookup Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability. The specific flaw exists within the External User Lookup functionality. The issue results from the lack of proper validation of a user-supplied string before using it to execute Java code. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21013.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut NG/MF | ||
PaperCut MF | <22.1.1 | |
PaperCut NG | <22.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39469 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2023-39469, update your PaperCut NG or MF installation to a version higher than 22.1.1.
CVE-2023-39469 affects installations of PaperCut NG and MF versions up to 22.1.1.
CVE-2023-39469 is a code injection vulnerability that leads to remote code execution on affected systems.
Yes, authentication is required to exploit CVE-2023-39469.