First published: Thu Mar 14 2024(Updated: )
This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut NG/MF | <20.1.10 | |
PaperCut NG/MF | >=21.0.0<21.2.14 | |
PaperCut NG/MF | >=22.0.0<22.1.5 | |
PaperCut NG/MF | >=23.0.1<23.0.7 | |
PaperCut NG/MF | <20.1.10 | |
PaperCut NG/MF | >=21.0.0<21.2.14 | |
PaperCut NG/MF | >=22.0.0<22.1.5 | |
PaperCut NG/MF | >=23.0.1<23.0.7 | |
Any of | ||
Apple macOS | ||
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.