First published: Thu Mar 14 2024(Updated: )
This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut NG/MF | <20.1.10 | |
PaperCut NG/MF | >=21.0.0<21.2.14 | |
PaperCut NG/MF | >=22.0.0<22.1.5 | |
PaperCut NG/MF | >=23.0.1<23.0.7 | |
PaperCut NG/MF | <20.1.10 | |
PaperCut NG/MF | >=21.0.0<21.2.14 | |
PaperCut NG/MF | >=22.0.0<22.1.5 | |
PaperCut NG/MF | >=23.0.1<23.0.7 | |
Any of | ||
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.