First published: Thu Mar 14 2024(Updated: )
This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut MF | <20.1.10 | |
PaperCut MF | >=21.0.0<21.2.14 | |
PaperCut MF | >=22.0.0<22.1.5 | |
PaperCut MF | >=23.0.1<23.0.7 | |
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
Any of | ||
Apple iOS and macOS | ||
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1221 has been classified as a medium severity vulnerability.
To fix CVE-2024-1221, update your PaperCut NG/MF to the latest version that addresses this vulnerability.
CVE-2024-1221 affects certain versions of PaperCut NG/MF up to 23.0.7 for both Linux and macOS.
CVE-2024-1221 may expose files on a PaperCut NG/MF server if exploited through a specifically crafted payload.
No, CVE-2024-1221 specifically affects Linux and macOS installations of PaperCut, not Windows.